Cyber Posture

CVE-2025-51056

HighPublic PoC

Published: 06 August 2025

Published
06 August 2025
Modified
09 October 2025
KEV Added
Patch
CVSS Score 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N
EPSS Score 0.0030 53.4th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-51056 is a high-severity Unrestricted Upload of File with Dangerous Type (CWE-434) vulnerability in Vedo Suite Project Vedo Suite. Its CVSS base score is 8.2 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 46.6% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 2 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires validation of uploaded files and paths in the uploadPreviews() function to block unrestricted arbitrary filesystem writes.

prevent

Enforces approved access authorizations to restrict the upload endpoint from writing to unauthorized filesystem paths.

prevent

Mandates timely remediation of the specific flaw in the '/api_vedo/colorways_preview' endpoint to eliminate the vulnerability.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1505.003 Web Shell Persistence
Adversaries may backdoor web servers with web shells to establish persistent access to systems.
T1105 Ingress Tool Transfer Command And Control
Adversaries may transfer tools or other files from an external system into a compromised environment.
Why these techniques?

Unrestricted file upload to arbitrary paths on public-facing app directly enables exploitation for RCE via web shell deployment and tool ingress.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

An unrestricted file upload vulnerability in Vedo Suite version 2024.17 allows remote authenticated attackers to write to arbitrary filesystem paths by exploiting the insecure 'uploadPreviews()' custom function in '/api_vedo/colorways_preview', ultimately resulting in remote code execution (RCE).

Deeper analysisAI

CVE-2025-51056 is an unrestricted file upload vulnerability affecting Vedo Suite version 2024.17. The flaw resides in the insecure 'uploadPreviews()' custom function exposed at the '/api_vedo/colorways_preview' endpoint, which permits attackers to write files to arbitrary filesystem paths. This issue, classified under CWE-434, carries a CVSS v3.1 base score of 8.2 (AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N) and was published on 2025-08-06.

Remote authenticated attackers can exploit this vulnerability over the network with low complexity, requiring some user interaction. By uploading malicious files through the vulnerable endpoint, they gain the ability to overwrite critical files on the server, culminating in remote code execution (RCE).

Reference URLs include http://bottinelli.com and https://github.com/jacopoaugelli/vedo-suite-exploits, which may provide additional details or exploit demonstrations, though specific mitigation or patch guidance is not detailed in the CVE description.

Proof-of-concept exploits are available in the referenced GitHub repository, indicating potential for straightforward weaponization.

Details

CWE(s)

Affected Products

vedo suite project
vedo suite
2024.17

CVEs Like This One

CVE-2025-63994Shared CWE-434
CVE-2025-6207Shared CWE-434
CVE-2025-6079Shared CWE-434
CVE-2025-6222Shared CWE-434
CVE-2026-32523Shared CWE-434
CVE-2025-66256Shared CWE-434
CVE-2024-13908Shared CWE-434
CVE-2026-3891Shared CWE-434
CVE-2025-12171Shared CWE-434
CVE-2026-6261Shared CWE-434

References