Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-55061: CWE-434 Unrestricted Upload of File with Dangerous Type in Priority Web

0
High
VulnerabilityCVE-2025-55061cvecve-2025-55061cwe-434
Published: Mon Dec 29 2025 (12/29/2025, 17:14:36 UTC)
Source: CVE Database V5
Vendor/Project: Priority
Product: Web

Description

CWE-434 Unrestricted Upload of File with Dangerous Type

AI-Powered Analysis

AILast updated: 12/30/2025, 23:19:18 UTC

Technical Analysis

CVE-2025-55061 is a vulnerability classified under CWE-434, indicating an unrestricted upload of files with dangerous types in the Priority Web product, versions 23.0 and below. This vulnerability allows an attacker with low privileges (PR:L) to remotely upload malicious files without requiring user interaction (UI:N), exploiting the system over the network (AV:N). The vulnerability affects confidentiality, integrity, and availability (C:H/I:H/A:H), meaning an attacker could execute arbitrary code, access sensitive data, or disrupt services. The vulnerability arises because the application does not properly restrict or validate the types of files that can be uploaded, enabling attackers to upload executable scripts or malware. Although no public exploits are currently known, the vulnerability's characteristics—remote network access, low privilege requirement, and no user interaction—make it highly exploitable. The lack of patch links indicates that a fix may not yet be publicly available, increasing the urgency for organizations to implement compensating controls. Priority Web is a business-critical application used in various sectors, and exploitation could lead to significant operational and data security impacts.

Potential Impact

For European organizations, this vulnerability poses a severe risk, especially those relying on Priority Web for critical business operations. Successful exploitation could lead to unauthorized access to sensitive corporate data, disruption of business processes, and potential lateral movement within networks. The high CVSS score reflects the potential for complete system compromise, which could affect confidentiality, integrity, and availability simultaneously. Sectors such as finance, manufacturing, and public administration using Priority Web are particularly vulnerable. The impact extends to regulatory compliance, as breaches involving personal or sensitive data could trigger GDPR violations and associated penalties. Additionally, operational disruptions could affect supply chains and service delivery, amplifying economic and reputational damage. The absence of known exploits currently provides a window for proactive defense, but the threat landscape could rapidly evolve once exploit code becomes available.

Mitigation Recommendations

European organizations should immediately review their use of Priority Web and restrict access to the affected versions (23.0 and below). Until patches are released, implement strict server-side validation of uploaded files, enforcing allowlists for file types and scanning uploads with advanced malware detection tools. Employ network segmentation to isolate Priority Web servers and limit exposure to untrusted networks. Monitor logs for unusual file upload activity and anomalous behavior indicative of exploitation attempts. Use web application firewalls (WAFs) configured to detect and block suspicious file uploads. Educate administrators and users about the risks and signs of exploitation. Establish an incident response plan specific to web application compromise scenarios. Finally, maintain close communication with Priority for timely patch releases and apply updates promptly once available.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
INCD
Date Reserved
2025-08-06T11:06:54.841Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695450b4db813ff03e2bef0b

Added to database: 12/30/2025, 10:22:44 PM

Last enriched: 12/30/2025, 11:19:18 PM

Last updated: 2/7/2026, 1:30:25 PM

Views: 74

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats