An arbitrary file rename vulnerability in the /admin/filer.php component of EasyImages 2.0 v2.8.6 and below allows attackers with Administrator privileges to execute arbitrary code via injecting a crafted payload into an uploaded file name.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 16 Dec 2025 04:30:00 +0900

Type Values Removed Values Added
CPEs cpe:2.3:a:easyimages2.0_project:easyimages2.0:*:*:*:*:*:*:*:*

Fri, 12 Dec 2025 06:45:00 +0900

Type Values Removed Values Added
First Time appeared Easyimages2.0 Project
Easyimages2.0 Project easyimages2.0
Vendors & Products Easyimages2.0 Project
Easyimages2.0 Project easyimages2.0

Fri, 12 Dec 2025 02:30:00 +0900

Type Values Removed Values Added
Weaknesses CWE-73
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 12 Dec 2025 01:30:00 +0900

Type Values Removed Values Added
Description An arbitrary file rename vulnerability in the /admin/filer.php component of EasyImages 2.0 v2.8.6 and below allows attackers with Administrator privileges to execute arbitrary code via injecting a crafted payload into an uploaded file name.
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-12-11T16:41:57.355Z

Reserved: 2025-11-18T00:00:00.000Z

Link: CVE-2025-65473

cve-icon Vulnrichment

Updated: 2025-12-11T16:40:20.516Z

cve-icon NVD

Status : Analyzed

Published: 2025-12-11T17:15:57.957

Modified: 2025-12-15T19:28:47.087

Link: CVE-2025-65473

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-12-12T06:37:40Z

Weaknesses