Cyber Posture

CVE-2025-70023

Critical

Published: 14 April 2026

Published
14 April 2026
Modified
17 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0005 16.5th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-70023 is a critical-severity Type Confusion (CWE-843) vulnerability. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 16.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-2 (Flaw Remediation) and RA-5 (Vulnerability Monitoring and Scanning).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly remediates the CWE-843 type confusion vulnerability in transloadit Uppy v0.25.6 by requiring timely patching or upgrading to a non-vulnerable version.

detect

Enables detection of systems affected by CVE-2025-70023 through regular vulnerability scanning targeting the vulnerable Uppy v0.25.6 library.

prevent

Mitigates exploitation of the incompatible type access (CWE-843) in Uppy by validating inputs to prevent malformed data from triggering the vulnerability.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Critical remote type confusion in public-facing JS upload library directly enables unauthenticated exploitation of web-facing application.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

An issue pertaining to CWE-843: Access of Resource Using Incompatible Type was discovered in transloadit uppy v0.25.6.

Deeper analysisAI

CVE-2025-70023 is a vulnerability classified under CWE-843 (Access of Resource Using Incompatible Type) affecting transloadit uppy version 0.25.6. Uppy is an open-source JavaScript library for file uploading and processing. The issue was published on 2026-04-14T18:16:41.677 and carries a CVSS v3.1 base score of 9.8, indicating critical severity due to its network accessibility, low attack complexity, lack of required privileges or user interaction, and high impacts on confidentiality, integrity, and availability.

The vulnerability can be exploited by any remote attacker with network access to an affected Uppy instance, requiring no authentication, privileges, or user interaction. Successful exploitation allows the attacker to achieve high-level compromise, including unauthorized access to sensitive data (C:H), modification of system resources (I:H), and disruption of service availability (A:H), all within the unchanged security scope (S:U).

Mitigation details are available in referenced advisories, including a GitHub Gist at https://gist.github.com/zcxlighthouse/27926a85371ac5d2291f44903254753e, the Transloadit GitHub organization at https://github.com/transloadi, and the official Uppy repository at https://github.com/transloadit/uppy. Security practitioners should consult these sources for patch information, upgrade guidance, or workarounds specific to version 0.25.6.

Details

CWE(s)

CVEs Like This One

CVE-2026-24874Shared CWE-843
CVE-2025-47151Shared CWE-843
CVE-2025-65570Shared CWE-843
CVE-2026-25537Shared CWE-843
CVE-2025-53144Shared CWE-843
CVE-2026-40683Shared CWE-843
CVE-2026-21854Shared CWE-843
CVE-2026-5865Shared CWE-843
CVE-2026-4702Shared CWE-843
CVE-2025-21342Shared CWE-843

References