Cyber Posture

CVE-2025-69906

HighPublic PoC

Published: 05 February 2026

Published
05 February 2026
Modified
11 February 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0012 29.8th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

Monstra CMS v3.0.4 contains an arbitrary file upload vulnerability in the Files Manager plugin. The application relies on blacklist-based file extension validation and stores uploaded files directly in a web-accessible directory. Under typical server configurations, this can allow an attacker…

more

to upload files that are interpreted as executable code, resulting in remote code execution.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly remediates the arbitrary file upload flaw in the Files Manager plugin by requiring timely patching of the vulnerable Monstra CMS component.

prevent

Enforces proper validation of file uploads at input points, preventing blacklist bypass techniques that enable executable code uploads.

preventdetect

Deploys malicious code protection mechanisms to scan and eradicate uploaded executable files before they can be interpreted and executed in the web-accessible directory.

Security SummaryAI

CVE-2025-69906 is an arbitrary file upload vulnerability in the Files Manager plugin of Monstra CMS version 3.0.4. The application performs blacklist-based validation of file extensions and stores uploaded files directly in a web-accessible directory. Under typical server configurations, this allows attackers to upload files interpreted as executable code, resulting in remote code execution. The vulnerability is associated with CWE-434 and has a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), published on 2026-02-05.

An attacker with low privileges, such as an authenticated user, can exploit this vulnerability remotely with low complexity and no user interaction. By uploading a malicious file that bypasses the blacklist—such as one with a double extension or other evasion techniques—the attacker can place executable code in the web root. This leads to remote code execution, providing high-impact access to confidentiality, integrity, and availability on the affected server.

Advisories and references include a GitHub repository documenting the vulnerability and proof-of-concept (https://github.com/cypherdavy/CVE-2025-69906-Monstra-CMS-3.0.4-Arbitrary-File-Upload-to-RCE) and the source code for the Files Manager plugin (https://github.com/monstra-cms/monstra/tree/master/plugins/box/filesmanager). No patches or specific mitigations are detailed in the CVE description.

Details

CWE(s)

Affected Products

monstra
monstra cms
3.0.4

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1505.003 Web Shell Persistence
Adversaries may backdoor web servers with web shells to establish persistent access to systems.
Why these techniques?

Arbitrary file upload in public-facing CMS plugin enables exploitation of public-facing application (T1190) via blacklist bypass (e.g., double extension), allowing upload of executable web shells (T1505.003) for RCE.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References