Home XnView CVE-2023-52173
Back to XnView

CVE-2023-52173

XnView Classic - xnview.exe

XnView CVSS 9.8 Updated March 18, 2026

Executive Risk Summary

"A Write Access Violation vulnerability exists in XnView Classic before version 2.51.3 on Windows, potentially allowing attackers to exploit the xnview.exe executable. This vulnerability could lead to a denial-of-service or potentially allow code execution, posing a risk to system integrity and confidentiality."

Operational Audit Arsenal

Target Type executable
Target Asset xnview.exe
Standard Path %ProgramFiles%\XnView\xnview.exe
PowerShell
# 🛠️ Senior Engineer Universal Audit
# Target: xnview.exe (executable)
$Targets = 'xnview.exe'
$SearchPaths = @("$env:windir\System32", "$env:ProgramFiles", "${env:ProgramFiles(x86)}")

Get-ChildItem -Path $SearchPaths -Include $Targets -Recurse -ErrorAction SilentlyContinue | 
Select-Object FullName, @{Name="Version";Expression={$_.VersionInfo.ProductVersion}}

Patch Impact Forecast

Reboot Required Unlikely

Minimal, as the update only affects the XnView Classic application

Internal Work Notes

Apply XnView Classic version 2.51.3 or later to mitigate a Write Access Violation vulnerability in the xnview.exe executable.

Technical Intelligence & Operational Utilities • Delivered Weekly

Intelligence Sources

Related XnView Threats

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.