CVE-2025-8450
Published: 19 August 2025
Summary
CVE-2025-8450 is a high-severity Missing Authentication for Critical Function (CWE-306) vulnerability in Fortra (inferred from references). Its CVSS base score is 8.2 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 46.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-14 (Permitted Actions Without Identification or Authentication) and AC-3 (Access Enforcement).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly addresses missing authentication for critical functions by identifying and explicitly authorizing only permitted actions without identification or authentication, preventing unauthenticated file uploads.
Enforces approved access control policies to restrict logical access to system resources like the order forms page, blocking unauthorized file uploads.
Validates and sanitizes file upload inputs to restrict dangerous file types, mitigating unrestricted uploads even if access controls partially fail.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Unauthenticated arbitrary file upload to public-facing Workflow component directly enables remote exploitation of the application (T1190) and ingress of attacker-controlled files/tools (T1105).
NVD Description
Improper Access Control issue in the Workflow component of Fortra's FileCatalyst allows unauthenticated users to upload arbitrary files via the order forms page.
Deeper analysisAI
CVE-2025-8450 is an improper access control vulnerability in the Workflow component of Fortra's FileCatalyst. It enables unauthenticated users to upload arbitrary files through the order forms page. The issue is classified under CWE-306 (Missing Authentication for Critical Function) and CWE-434 (Unrestricted Upload of File with Dangerous Type), with a CVSS v3.1 base score of 8.2 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H), indicating high severity due to its network accessibility, low complexity, and potential for significant availability impact.
Remote unauthenticated attackers can exploit this vulnerability over the network without user interaction or privileges required. Successful exploitation allows arbitrary file uploads, which could lead to high availability disruption (e.g., denial of service via resource exhaustion) and low integrity impacts, such as overwriting or injecting files, though confidentiality is not directly affected.
Fortra has issued security advisory FI-2025-010, available at https://www.fortra.com/security/advisories/product-security/fi-2025-010, which provides details on the vulnerability and recommended mitigations.
Details
- CWE(s)