ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

The most open and flexible enterprise DevOps solution. CloudBees enables enterprises to deliver scalable, compliant, and secure software, empowering developers to do their best work. Seamlessly integrating into any hybrid and heterogeneous environment, CloudBees is a strategic partner in your cloud transformation journey, ensuring security, compliance, and operational efficiency while enhancing the developer experience across your entire software development lifecycle.

CloudBees A.I CyberSecurity Scoring

CloudBees

Company Details

Linkedin ID:

cloudbees

Employees number:

534

Number of followers:

68,178

NAICS:

5112

Industry Type:

Software Development

Homepage:

CloudBees.com

IP Addresses:

Scan still pending

Company ID:

CLO_3181659

Scan Status:

In-progress

AI scoreCloudBees Risk Score (AI oriented)

Between 750 and 799

https://images.rankiteo.com/companyimages/cloudbees.jpeg
CloudBees Software Development
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreCloudBees Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/cloudbees.jpeg
CloudBees Software Development
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

CloudBees

Fair
Current Score
756
Baa (Fair)
01000
1 incidents
-2.0 avg impact

Incident timeline with MITRE ATT&CK tactics, techniques, and mitigations.

JANUARY 2026
756
DECEMBER 2025
756
NOVEMBER 2025
755
OCTOBER 2025
755
SEPTEMBER 2025
755
AUGUST 2025
755
JULY 2025
755
JUNE 2025
757
Vulnerability
16 Jun 2025 • Laravel, Laravel Swiss and Bee Interactive: Livewire Filemanager Vulnerability Exposes Web Applications to RCE Attacks
Critical RCE Vulnerability Discovered in Livewire Filemanager for Laravel (CVE-2025-14894)

**Critical RCE Vulnerability Discovered in Livewire Filemanager for Laravel (CVE-2025-14894)** A high-severity security flaw (CVE-2025-14894, VU#650657) has been identified in **Livewire Filemanager**, a popular file management component used in **Laravel web applications**. The vulnerability, disclosed on **January 16, 2026**, allows **unauthenticated attackers to execute arbitrary code** on vulnerable servers by exploiting improper file validation. ### **Root Cause & Exploitation** The flaw stems from **inadequate file type and MIME validation** in the `LivewireFilemanagerComponent.php` component. Attackers can upload malicious **PHP files** via the web interface, which are then stored in the publicly accessible `/storage/` directory assuming the `php artisan storage:link` command was run during Laravel setup. Once uploaded, the files can be executed remotely, granting **remote code execution (RCE)** with the privileges of the web server user. ### **Impact & Risks** Successful exploitation enables: - **Full system compromise**, including unrestricted file read/write access. - **Lateral movement** to connected systems and infrastructure. - **No authentication required** attackers only need to upload a PHP webshell and access it via the storage URL. ### **Affected Vendors & Response** At the time of disclosure, **no vendors** (Bee Interactive, Laravel, Laravel Swiss) have acknowledged the vulnerability. The **CERT/CC** recommends immediate mitigation, including: - **Removing web serving capability** from the `/storage/` directory if unnecessary. - **Implementing strict file upload restrictions** (e.g., allowlists for safe file types, MIME validation). - **Storing uploaded files outside web-accessible directories** and disabling the public storage link if unused. The vulnerability highlights a critical gap in **Livewire’s security model**, which defers file validation to developers despite architectural risks. Organizations using the component are urged to apply protections independently.

755
critical -2
LARDUTCLO1768827460
Remote Code Execution (RCE)
Improper file type and MIME validation in file uploads
CVE-2025-14894
Systems Affected: Laravel web applications using Livewire Filemanager Operational Impact: Full system compromise, lateral movement to connected systems
Removing web serving capability from the /storage/ directory if unnecessary Implementing strict file upload restrictions (e.g., allowlists for safe file types, MIME validation) Storing uploaded files outside web-accessible directories Disabling the public storage link if unused
File Types Exposed: PHP files (malicious webshells)
The vulnerability highlights a critical gap in Livewire’s security model, which defers file validation to developers despite architectural risks.
Apply strict file upload restrictions (allowlists, MIME validation) Store uploaded files outside web-accessible directories Disable public storage link if unused Monitor for unauthorized file uploads
Root Causes: Inadequate file type and MIME validation in LivewireFilemanagerComponent.php
MAY 2025
757
APRIL 2025
757
MARCH 2025
757
FEBRUARY 2025
757

Frequently Asked Questions

According to Rankiteo, the current A.I.-based Cyber Score for CloudBees is 756, which corresponds to a Fair rating.

According to Rankiteo, the A.I. Rankiteo Cyber Score for December 2025 was 756.

According to Rankiteo, the A.I. Rankiteo Cyber Score for November 2025 was 755.

According to Rankiteo, the A.I. Rankiteo Cyber Score for October 2025 was 755.

According to Rankiteo, the A.I. Rankiteo Cyber Score for September 2025 was 755.

According to Rankiteo, the A.I. Rankiteo Cyber Score for August 2025 was 755.

According to Rankiteo, the A.I. Rankiteo Cyber Score for July 2025 was 755.

According to Rankiteo, the A.I. Rankiteo Cyber Score for June 2025 was 757.

According to Rankiteo, the A.I. Rankiteo Cyber Score for May 2025 was 757.

According to Rankiteo, the A.I. Rankiteo Cyber Score for April 2025 was 757.

According to Rankiteo, the A.I. Rankiteo Cyber Score for March 2025 was 757.

According to Rankiteo, the A.I. Rankiteo Cyber Score for February 2025 was 757.

Over the past 12 months, the average per-incident point impact on CloudBees’s A.I Rankiteo Cyber Score has been -2.0 points.

You can access CloudBees’s cyber incident details on Rankiteo by visiting the following link: https://www.rankiteo.com/company/cloudbees.

You can find the summary of the A.I Rankiteo Risk Scoring methodology on Rankiteo by visiting the following link: Rankiteo Algorithm.

You can view CloudBees’s profile page on Rankiteo by visiting the following link: https://www.rankiteo.com/company/cloudbees.

With scores of 18.5/20 from OpenAI ChatGPT, 20/20 from Mistral AI, and 17/20 from Claude AI, the A.I. Rankiteo Risk Scoring methodology is validated as a market leader.