CVE-2025-62056
Published: 22 January 2026
Summary
CVE-2025-62056 is a critical-severity Unrestricted Upload of File with Dangerous Type (CWE-434) vulnerability. Its CVSS base score is 9.9 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 4.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates the CVE by requiring timely remediation and patching of the vulnerable News Event WordPress theme to versions beyond 1.0.1.
Validates the content of file uploads to the WordPress theme, preventing acceptance of dangerous file types that could lead to remote code execution.
Restricts file uploads in the News Event theme to only permitted types and characteristics, blocking unrestricted uploads of dangerous files by low-privilege users.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Unrestricted arbitrary file upload (CWE-434) in a public-facing WordPress theme directly enables web shell deployment and remote code execution on the server.
NVD Description
Unrestricted Upload of File with Dangerous Type vulnerability in blazethemes News Event news-event.This issue affects News Event: from n/a through <= 1.0.1.
Deeper analysisAI
CVE-2025-62056 is an Unrestricted Upload of File with Dangerous Type vulnerability (CWE-434) in the News Event WordPress theme developed by BlazeThemes. The issue affects the News Event theme from unknown initial versions through version 1.0.1.
The vulnerability has a CVSS v3.1 base score of 9.9 (AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H), indicating it is exploitable over the network with low attack complexity by an authenticated user with low privileges and no user interaction required. Successful exploitation allows the attacker to achieve high impacts on confidentiality, integrity, and availability, likely enabling arbitrary file uploads that could lead to remote code execution or full server compromise due to the changed scope.
Mitigation details are available in advisories such as the Patchstack database entry at https://patchstack.com/database/Wordpress/Theme/news-event/vulnerability/wordpress-news-event-theme-1-0-1-arbitrary-file-upload-vulnerability?_s_id=cve. The vulnerability was published on 2026-01-22T17:15:58.757.
Details
- CWE(s)