An arbitrary file rename vulnerability in the /admin/filer.php component of EasyImages 2.0 v2.8.6 and below allows attackers with Administrator privileges to execute arbitrary code via injecting a crafted payload into an uploaded file name.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 15 Dec 2025 19:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:easyimages2.0_project:easyimages2.0:*:*:*:*:*:*:*:*

Thu, 11 Dec 2025 21:45:00 +0000

Type Values Removed Values Added
First Time appeared Easyimages2.0 Project
Easyimages2.0 Project easyimages2.0
Vendors & Products Easyimages2.0 Project
Easyimages2.0 Project easyimages2.0

Thu, 11 Dec 2025 17:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-73
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 11 Dec 2025 16:30:00 +0000

Type Values Removed Values Added
Description An arbitrary file rename vulnerability in the /admin/filer.php component of EasyImages 2.0 v2.8.6 and below allows attackers with Administrator privileges to execute arbitrary code via injecting a crafted payload into an uploaded file name.
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-12-11T16:41:57.355Z

Reserved: 2025-11-18T00:00:00.000Z

Link: CVE-2025-65473

cve-icon Vulnrichment

Updated: 2025-12-11T16:40:20.516Z

cve-icon NVD

Status : Analyzed

Published: 2025-12-11T17:15:57.957

Modified: 2025-12-15T19:28:47.087

Link: CVE-2025-65473

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-12-11T21:37:40Z

Weaknesses