Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62182: CWE-434: Unrestricted Upload of File with Dangerous Type in Pegasystems Pega Infinity

0
Medium
VulnerabilityCVE-2025-62182cvecve-2025-62182cwe-434
Published: Tue Jan 13 2026 (01/13/2026, 16:37:06 UTC)
Source: CVE Database V5
Vendor/Project: Pegasystems
Product: Pega Infinity

Description

CVE-2025-62182 is a medium-severity vulnerability in Pegasystems Pega Infinity (versions 8. 7. 0 through 25. 1. 0) involving unrestricted file upload by privileged users. This flaw allows such users to upload files without proper validation, potentially enabling malicious file uploads. Exploitation does not require user interaction and can be performed remotely with low attack complexity, but requires privileged access. The vulnerability impacts confidentiality and integrity with limited impact on availability. No known public exploits exist yet, and no patches have been published. European organizations using Pega Infinity, especially in sectors relying on customer service frameworks, should be vigilant.

AI-Powered Analysis

AILast updated: 01/21/2026, 02:53:19 UTC

Technical Analysis

CVE-2025-62182 is a vulnerability classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) affecting Pegasystems Pega Infinity, specifically versions from 8.7.0 through 25.1.0. The flaw allows privileged users to upload files without sufficient validation or restriction on file types, which could lead to the introduction of malicious files into the system. Such files might be used to execute unauthorized code, manipulate data, or facilitate further attacks within the environment. The vulnerability is exploitable remotely over the network without user interaction, and the attack complexity is low, but it requires the attacker to have privileged access, which limits the attack surface to trusted users or compromised accounts. The CVSS 4.0 score of 5.3 reflects a medium severity, indicating moderate impact primarily on confidentiality and integrity, with limited availability impact. No patches or known exploits are currently available, but the vulnerability's presence in widely used customer service frameworks means it could be leveraged in targeted attacks. The lack of authentication bypass or user interaction requirements makes it a concern for insider threat scenarios or attackers who have gained elevated privileges through other means.

Potential Impact

For European organizations, the impact of CVE-2025-62182 can be significant, especially in sectors where Pega Infinity is deployed for customer service and business process management. The ability for privileged users to upload malicious files could lead to unauthorized code execution, data breaches, or lateral movement within corporate networks. This could compromise sensitive customer data, disrupt service operations, and damage organizational reputation. Since the vulnerability requires privileged access, the risk is heightened in environments with weak internal access controls or insufficient monitoring of privileged accounts. The medium severity suggests that while immediate widespread disruption is unlikely, targeted attacks could cause substantial harm, particularly in financial services, telecommunications, and government agencies that rely heavily on Pega systems. Additionally, the absence of patches means organizations must rely on compensating controls until official fixes are released.

Mitigation Recommendations

To mitigate CVE-2025-62182, organizations should implement strict access controls to limit privileged user accounts only to essential personnel and enforce the principle of least privilege. Deploy robust monitoring and logging of file upload activities to detect anomalous behavior promptly. Implement application-layer filtering and validation mechanisms to restrict allowed file types and scan uploaded files for malware before processing. Network segmentation can help contain potential exploitation impacts by isolating Pega Infinity environments from critical infrastructure. Organizations should also prepare for patch deployment by tracking vendor advisories closely and testing updates in controlled environments. Conduct regular security awareness training focused on insider threats and privilege misuse. Finally, consider deploying endpoint detection and response (EDR) solutions to identify and respond to suspicious activities related to file uploads or privilege escalations.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Pega
Date Reserved
2025-10-07T19:04:27.220Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69667940a60475309f8fa69d

Added to database: 1/13/2026, 4:56:32 PM

Last enriched: 1/21/2026, 2:53:19 AM

Last updated: 2/6/2026, 2:14:40 AM

Views: 34

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats