CVE-2026-25099
Published: 27 March 2026
Description
Bludit’s API plugin allows an authenticated attacker with a valid API token to upload files of any type and extension without restriction, which can then be executed, leading to Remote Code Execution. This issue was fixed in 3.18.4.
Mitigating Controls (NIST 800-53 r5)AI
Requires validation of file types and extensions at the API upload endpoint, directly preventing unrestricted uploads of dangerous files leading to RCE.
Mandates timely remediation of identified flaws, such as patching Bludit to version 3.18.4 to fix the API plugin's upload vulnerability.
Enforces restrictions on allowed file types at API input points, blocking uploads of executable or dangerous extensions exploited in this CVE.
Security SummaryAI
CVE-2026-25099 is a high-severity vulnerability in Bludit, an open-source flat-file CMS, specifically affecting its API plugin. The flaw allows unrestricted file uploads of any type and extension, enabling subsequent execution of uploaded files and resulting in remote code execution (RCE). Assigned CWE-434 (Unrestricted Upload of File with Dangerous Type), it carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), highlighting its critical impact due to network accessibility, low attack complexity, and low privilege requirements.
An authenticated attacker possessing a valid API token can exploit this vulnerability remotely without user interaction. By leveraging the API plugin's lack of file type or extension restrictions, the attacker uploads malicious files—such as web shells—that can then be executed on the server, granting full control over the affected Bludit instance, including data exfiltration, persistence, or further lateral movement.
Mitigation is available through the official patch in Bludit version 3.18.4, as detailed in the release notes on GitHub. Additional advisory information from CERT.pl outlines the issue and recommends immediate upgrading to the fixed version, along with reviewing API token access controls to limit exposure.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
CVE enables exploitation of public-facing CMS API (T1190) through unrestricted file uploads, directly facilitating web shell deployment and RCE (T1100).