Cyber Posture

CVE-2025-57794

Critical

Published: 28 January 2026

Published
28 January 2026
Modified
05 February 2026
KEV Added
Patch
CVSS Score 9.1 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0039 60.2th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

Explorance Blue versions prior to 8.14.9 contain an authenticated unrestricted file upload vulnerability in the administrative interface. The application does not adequately restrict uploaded file types, allowing malicious files to be uploaded and executed by the server. This condition enables…

more

remote code execution under default configurations.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates unrestricted file uploads by validating uploaded file types and content to block dangerous files from execution.

prevent

Restricts information inputs in the administrative interface to only safe file types, preventing upload of malicious executables.

prevent

Ensures timely remediation of the specific application flaw through vendor patching to version 8.14.9 or later.

Security SummaryAI

CVE-2025-57794 is an authenticated unrestricted file upload vulnerability in the administrative interface of Explorance Blue versions prior to 8.14.9. The application fails to adequately restrict uploaded file types, allowing malicious files to be uploaded and subsequently executed by the server. This flaw enables remote code execution under default configurations and carries a CVSS v3.1 base score of 9.1 (AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H), mapped to CWE-434 (Unrestricted Upload of File with Dangerous Type).

Exploitation requires an authenticated user with high privileges, such as administrative access to the interface. A successful attack allows the upload of a malicious file that executes arbitrary code on the server, granting the attacker high-impact control over confidentiality, integrity, and availability, with a changed scope due to the server's execution context.

Vendor advisories from Explorance recommend updating to version 8.14.9 or later to mitigate the vulnerability. Additional details are provided in the official security advisories at https://online-help.explorance.com/blue/articles/security-advisories-(january-2026) and https://online-help.explorance.com/blue/articles/security-advisory:-cve-2025-57794, a Mandiant disclosure at https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2026/MNDT-2026-0003.md, and product information at https://www.explorance.com/products/blue.

Details

CWE(s)

Affected Products

explorance
blue
≤ 8.14.9

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1505.003 Web Shell Persistence
Adversaries may backdoor web servers with web shells to establish persistent access to systems.
Why these techniques?

The CVE describes an unrestricted file upload in a web application's administrative interface leading to server-side code execution, directly enabling exploitation of public-facing applications (T1190) and execution via uploaded web shells or malicious files (T1100).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References