CVE-2025-57794
Published: 28 January 2026
Summary
CVE-2025-57794 is a critical-severity Unrestricted Upload of File with Dangerous Type (CWE-434) vulnerability in Explorance Blue. Its CVSS base score is 9.1 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 39.7% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates unrestricted file uploads by validating uploaded file types and content to block dangerous files from execution.
Restricts information inputs in the administrative interface to only safe file types, preventing upload of malicious executables.
Ensures timely remediation of the specific application flaw through vendor patching to version 8.14.9 or later.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The CVE describes an unrestricted file upload in a web application's administrative interface leading to server-side code execution, directly enabling exploitation of public-facing applications (T1190) and execution via uploaded web shells or malicious files (T1100).
NVD Description
Explorance Blue versions prior to 8.14.9 contain an authenticated unrestricted file upload vulnerability in the administrative interface. The application does not adequately restrict uploaded file types, allowing malicious files to be uploaded and executed by the server. This condition enables…
more
remote code execution under default configurations.
Deeper analysisAI
CVE-2025-57794 is an authenticated unrestricted file upload vulnerability in the administrative interface of Explorance Blue versions prior to 8.14.9. The application fails to adequately restrict uploaded file types, allowing malicious files to be uploaded and subsequently executed by the server. This flaw enables remote code execution under default configurations and carries a CVSS v3.1 base score of 9.1 (AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H), mapped to CWE-434 (Unrestricted Upload of File with Dangerous Type).
Exploitation requires an authenticated user with high privileges, such as administrative access to the interface. A successful attack allows the upload of a malicious file that executes arbitrary code on the server, granting the attacker high-impact control over confidentiality, integrity, and availability, with a changed scope due to the server's execution context.
Vendor advisories from Explorance recommend updating to version 8.14.9 or later to mitigate the vulnerability. Additional details are provided in the official security advisories at https://online-help.explorance.com/blue/articles/security-advisories-(january-2026) and https://online-help.explorance.com/blue/articles/security-advisory:-cve-2025-57794, a Mandiant disclosure at https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2026/MNDT-2026-0003.md, and product information at https://www.explorance.com/products/blue.
Details
- CWE(s)