| CVE ID | CVE-2026-25099 |
| Publication date | 27 March 2026 |
| Vendor | Bludit |
| Product | Bludit |
| Vulnerable versions | All before 3.18.4 |
| Vulnerability type (CWE) | Unrestricted Upload of File with Dangerous Type (CWE-434) |
| Report source | Report to CERT Polska |
| CVE ID | CVE-2026-25100 |
| Publication date | 27 March 2026 |
| Vendor | Bludit |
| Product | Bludit |
| Vulnerable versions | All through 3.18.2 |
| Vulnerability type (CWE) | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') (CWE-79) |
| Report source | Report to CERT Polska |
| CVE ID | CVE-2026-25101 |
| Publication date | 27 March 2026 |
| Vendor | Bludit |
| Product | Bludit |
| Vulnerable versions | All before 3.17.2 |
| Vulnerability type (CWE) | Session Fixation (CWE-384) |
| Report source | Report to CERT Polska |
Description
CERT Polska has received a report about vulnerabilities in Bludit software and participated in coordination of their disclosure.
The vulnerability CVE-2026-25099: Bludit’s API plugin allows an authenticated attacker with a valid API token to upload files of any type and extension without restriction, which can then be executed, leading to Remote Code Execution.
This issue was fixed in 3.18.4.
The vulnerability CVE-2026-25100: Bludit is vulnerable to Stored Cross-Site Scripting (XSS) in its image upload functionality. An authenticated attacker with content upload privileges (such as Author, Editor, or Administrator) can upload an SVG file containing a malicious payload, which is executed when a victim visits the URL of the uploaded resource. The uploaded resource itself is accessible without authentication.
The vendor was notified early about this vulnerability, but stopped responding in the middle of coordination. All versions up to 3.18.2 are considered to be vulnerable, future versions might also be vulnerable.
The vulnerability CVE-2026-25101: Bludit allows user's session identifier to be set before authentication. The value of this session ID stays the same after authentication. This behavior enables an attacker to fix a session ID for a victim and later hijack the authenticated session.
This issue was fixed in version 3.17.2.
Credits
We thank Arkadiusz Marta for the responsible vulnerability report.
More about the coordinated vulnerability disclosure process at CERT Polska can be found at https://cert.pl/en/cvd/.