Skip to main content

CVE-2025-8450: CWE-434 Unrestricted Upload of File with Dangerous Type in Fortra FileCatalyst

High
VulnerabilityCVE-2025-8450cvecve-2025-8450cwe-434cwe-306
Published: Tue Aug 19 2025 (08/19/2025, 18:01:14 UTC)
Source: CVE Database V5
Vendor/Project: Fortra
Product: FileCatalyst

Description

Improper Access Control issue in the Workflow component of Fortra's FileCatalyst allows unauthenticated users to upload arbitrary files via the order forms page.

AI-Powered Analysis

AILast updated: 08/19/2025, 18:32:51 UTC

Technical Analysis

CVE-2025-8450 is a high-severity vulnerability affecting Fortra's FileCatalyst product, specifically version 5.1.6. The issue is classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) and CWE-306 (Improper Access Control). The vulnerability resides in the Workflow component of FileCatalyst, where improper access control allows unauthenticated users to upload arbitrary files via the order forms page. Because no authentication or user interaction is required, an attacker can directly exploit this flaw remotely over the network (AV:N, PR:N, UI:N). The vulnerability does not impact confidentiality but can cause significant integrity and availability issues, as indicated by the CVSS vector (C:N/I:L/A:H). An attacker can upload malicious files, potentially leading to remote code execution, server compromise, or denial of service by overwriting or injecting harmful payloads. Although no known exploits are currently reported in the wild, the ease of exploitation and the critical nature of file upload vulnerabilities make this a significant threat. The lack of patches at the time of publication further increases risk. This vulnerability highlights a failure in enforcing proper access controls and input validation on file uploads, allowing dangerous file types to be uploaded without restriction or verification.

Potential Impact

For European organizations using Fortra FileCatalyst 5.1.6, this vulnerability poses a substantial risk. FileCatalyst is often used for accelerated file transfers in industries such as media, finance, and government sectors. Exploitation could lead to unauthorized file uploads that compromise system integrity, enabling attackers to deploy malware, ransomware, or disrupt critical file transfer workflows. This can result in operational downtime, data corruption, and potential lateral movement within networks. Given the unauthenticated nature of the exploit, attackers can target exposed FileCatalyst instances directly, increasing the attack surface. Organizations handling sensitive or regulated data (e.g., GDPR-protected personal data) may face compliance violations and reputational damage if exploited. The high availability impact could disrupt business continuity, especially in sectors relying on timely and secure file transfers. The absence of known exploits currently provides a window for proactive mitigation, but the threat remains urgent due to the vulnerability's characteristics.

Mitigation Recommendations

European organizations should immediately audit their FileCatalyst deployments to identify any instances running version 5.1.6. Until a vendor patch is available, organizations should implement strict network-level controls such as firewall rules to restrict access to the order forms page and the Workflow component only to trusted internal IPs or VPN users. Employing web application firewalls (WAFs) with custom rules to detect and block suspicious file upload attempts can reduce risk. Monitoring logs for unusual file upload activity or unexpected file types is critical. Organizations should also consider disabling or restricting the order forms page functionality if not essential. Segmentation of the FileCatalyst server from critical infrastructure can limit potential lateral movement. Once Fortra releases a patch, rapid deployment is essential. Additionally, organizations should review and enforce strict file type validation and access control policies within their file transfer workflows to prevent similar issues. Incident response plans should be updated to include detection and remediation steps for unauthorized file uploads.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Fortra
Date Reserved
2025-07-31T21:30:46.989Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68a4bfcbad5a09ad00fa0995

Added to database: 8/19/2025, 6:17:47 PM

Last enriched: 8/19/2025, 6:32:51 PM

Last updated: 8/19/2025, 7:02:48 PM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats