CVE-2025-68909
Published: 22 January 2026
Summary
CVE-2025-68909 is a critical-severity Unrestricted Upload of File with Dangerous Type (CWE-434) vulnerability. Its CVSS base score is 9.9 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 19.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Requires timely identification, reporting, and remediation of software flaws like the unrestricted file upload vulnerability in Blogistic <=1.0.5, preventing exploitation via patching.
Enforces validation of information inputs such as uploaded files to reject dangerous types and contents, directly mitigating CWE-434 unrestricted uploads.
Deploys and maintains malicious code protection mechanisms to scan and block execution of dangerous uploaded files like webshells.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Unrestricted file upload (CWE-434) in public-facing WordPress theme directly enables web shell deployment for RCE.
NVD Description
Unrestricted Upload of File with Dangerous Type vulnerability in blazethemes Blogistic blogistic allows Using Malicious Files.This issue affects Blogistic: from n/a through <= 1.0.5.
Deeper analysisAI
CVE-2025-68909 is an Unrestricted Upload of File with Dangerous Type vulnerability (CWE-434) in the Blogistic WordPress theme by blazethemes. The flaw allows the use of malicious files and affects Blogistic versions from n/a through 1.0.5.
The vulnerability carries a CVSS v3.1 base score of 9.9 (Critical), with attack vector AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H. Low-privileged users, such as authenticated WordPress contributors, can exploit it remotely with low complexity and no user interaction. Exploitation enables high-impact compromise of confidentiality, integrity, and availability across the affected scope, typically through uploading dangerous files like webshells for remote code execution.
Mitigation details are available in the Patchstack advisory at https://patchstack.com/database/Wordpress/Theme/blogistic/vulnerability/wordpress-blogistic-theme-1-0-5-arbitrary-file-upload-vulnerability?_s_id=cve, which covers this arbitrary file upload issue in Blogistic 1.0.5.
Details
- CWE(s)