Vulnerabilites related to sitecore - experience_platform
CVE-2024-46938 (GCVE-0-2024-46938)
Vulnerability from cvelistv5
Published
2024-09-15 00:00
Modified
2024-09-17 15:06
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
An issue was discovered in Sitecore Experience Platform (XP), Experience Manager (XM), and Experience Commerce (XC) 8.0 Initial Release through 10.4 Initial Release. An unauthenticated attacker can read arbitrary files.
References
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:sitecore:experience_platform:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "experience_platform", "vendor": "sitecore", "versions": [ { "lessThan": "10.4", "status": "affected", "version": "8.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:sitecore:experience_manager:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "experience_manager", "vendor": "sitecore", "versions": [ { "lessThan": "10.4", "status": "affected", "version": "8.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:sitecore:experience_commerce:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "experience_commerce", "vendor": "sitecore", "versions": [ { "lessThan": "10.4", "status": "affected", "version": "8.0", "versionType": "custom" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-46938", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-17T15:03:29.479669Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-17T15:06:07.924Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Sitecore Experience Platform (XP), Experience Manager (XM), and Experience Commerce (XC) 8.0 Initial Release through 10.4 Initial Release. An unauthenticated attacker can read arbitrary files." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-15T21:48:11.439152", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://support.sitecore.com/kb?id=kb_article_view\u0026sysparm_article=KB1003408" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2024-46938", "datePublished": "2024-09-15T00:00:00", "dateReserved": "2024-09-15T00:00:00", "dateUpdated": "2024-09-17T15:06:07.924Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-33652 (GCVE-0-2023-33652)
Vulnerability from cvelistv5
Published
2023-06-06 00:00
Modified
2025-01-08 14:38
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Sitecore Experience Platform (XP) v9.3 was discovered to contain an authenticated remote code execution (RCE) vulnerability via the component /sitecore/shell/Invoke.aspx.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T15:47:06.777Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://blog.assetnote.io/2023/05/10/sitecore-round-two/" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-33652", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-01-08T14:34:45.504378Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-470", "description": "CWE-470 Use of Externally-Controlled Input to Select Classes or Code (\u0027Unsafe Reflection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-08T14:38:32.693Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Sitecore Experience Platform (XP) v9.3 was discovered to contain an authenticated remote code execution (RCE) vulnerability via the component /sitecore/shell/Invoke.aspx." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-06T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://blog.assetnote.io/2023/05/10/sitecore-round-two/" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-33652", "datePublished": "2023-06-06T00:00:00", "dateReserved": "2023-05-22T00:00:00", "dateUpdated": "2025-01-08T14:38:32.693Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-35813 (GCVE-0-2023-35813)
Vulnerability from cvelistv5
Published
2023-06-17 00:00
Modified
2024-12-17 16:20
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple Sitecore products allow remote code execution. This affects Experience Manager, Experience Platform, and Experience Commerce through 10.3.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:30:45.345Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://support.sitecore.com/kb?id=kb_article_view\u0026sysparm_article=KB1002979" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-35813", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-12-17T16:19:13.632398Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-94", "description": "CWE-94 Improper Control of Generation of Code (\u0027Code Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-17T16:20:49.395Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Multiple Sitecore products allow remote code execution. This affects Experience Manager, Experience Platform, and Experience Commerce through 10.3." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-17T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://support.sitecore.com/kb?id=kb_article_view\u0026sysparm_article=KB1002979" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-35813", "datePublished": "2023-06-17T00:00:00", "dateReserved": "2023-06-17T00:00:00", "dateUpdated": "2024-12-17T16:20:49.395Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-11080 (GCVE-0-2019-11080)
Vulnerability from cvelistv5
Published
2019-06-06 13:33
Modified
2024-08-04 22:40
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Sitecore Experience Platform (XP) prior to 9.1.1 is vulnerable to remote code execution via deserialization, aka TFS # 293863. An authenticated user with necessary permissions is able to remotely execute OS commands by sending a crafted serialized object.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T22:40:16.283Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://dev.sitecore.net/Downloads/Sitecore%20Experience%20Platform/91/Sitecore%20Experience%20Platform%2091%20Update1/Release%20Notes" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/minecrater/exploits/blob/master/Sitecore8xDeserialRCE" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/153274/Sitecore-8.x-Deserialization-Remote-Code-Execution.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Sitecore Experience Platform (XP) prior to 9.1.1 is vulnerable to remote code execution via deserialization, aka TFS # 293863. An authenticated user with necessary permissions is able to remotely execute OS commands by sending a crafted serialized object." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-06-13T20:06:03", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://dev.sitecore.net/Downloads/Sitecore%20Experience%20Platform/91/Sitecore%20Experience%20Platform%2091%20Update1/Release%20Notes" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/minecrater/exploits/blob/master/Sitecore8xDeserialRCE" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/153274/Sitecore-8.x-Deserialization-Remote-Code-Execution.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-11080", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Sitecore Experience Platform (XP) prior to 9.1.1 is vulnerable to remote code execution via deserialization, aka TFS # 293863. An authenticated user with necessary permissions is able to remotely execute OS commands by sending a crafted serialized object." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://dev.sitecore.net/Downloads/Sitecore%20Experience%20Platform/91/Sitecore%20Experience%20Platform%2091%20Update1/Release%20Notes", "refsource": "MISC", "url": "https://dev.sitecore.net/Downloads/Sitecore%20Experience%20Platform/91/Sitecore%20Experience%20Platform%2091%20Update1/Release%20Notes" }, { "name": "https://github.com/minecrater/exploits/blob/master/Sitecore8xDeserialRCE", "refsource": "MISC", "url": "https://github.com/minecrater/exploits/blob/master/Sitecore8xDeserialRCE" }, { "name": "http://packetstormsecurity.com/files/153274/Sitecore-8.x-Deserialization-Remote-Code-Execution.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/153274/Sitecore-8.x-Deserialization-Remote-Code-Execution.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-11080", "datePublished": "2019-06-06T13:33:43", "dateReserved": "2019-04-10T00:00:00", "dateUpdated": "2024-08-04T22:40:16.283Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-27068 (GCVE-0-2023-27068)
Vulnerability from cvelistv5
Published
2023-05-23 00:00
Modified
2025-01-28 20:08
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Deserialization of Untrusted Data in Sitecore Experience Platform through 10.2 allows remote attackers to run arbitrary code via ValidationResult.aspx.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T12:01:32.227Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://dev.sitecore.net/Downloads/Sitecore%20Experience%20Platform/103/Sitecore%20Experience%20Platform%20103/Release%20Notes" }, { "tags": [ "x_transferred" ], "url": "https://www.sitecore.com/products/sitecore-experience-platform" }, { "tags": [ "x_transferred" ], "url": "https://blogs.night-wolf.io/0-day-vulnerabilities-at-sitecore-pagedesigner" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-27068", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-28T20:08:04.555157Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-502", "description": "CWE-502 Deserialization of Untrusted Data", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-28T20:08:44.492Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Deserialization of Untrusted Data in Sitecore Experience Platform through 10.2 allows remote attackers to run arbitrary code via ValidationResult.aspx." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-23T00:00:00.000Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://dev.sitecore.net/Downloads/Sitecore%20Experience%20Platform/103/Sitecore%20Experience%20Platform%20103/Release%20Notes" }, { "url": "https://www.sitecore.com/products/sitecore-experience-platform" }, { "url": "https://blogs.night-wolf.io/0-day-vulnerabilities-at-sitecore-pagedesigner" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-27068", "datePublished": "2023-05-23T00:00:00.000Z", "dateReserved": "2023-02-27T00:00:00.000Z", "dateUpdated": "2025-01-28T20:08:44.492Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-9874 (GCVE-0-2019-9874)
Vulnerability from cvelistv5
Published
2019-05-31 20:11
Modified
2025-07-30 01:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Deserialization of Untrusted Data in the Sitecore.Security.AntiCSRF (aka anti CSRF) module in Sitecore CMS 7.0 to 7.2 and Sitecore XP 7.5 to 8.2 allows an unauthenticated attacker to execute arbitrary code by sending a serialized .NET object in the HTTP POST parameter __CSRFTOKEN.
References
▼ | URL | Tags |
---|---|---|
https://dev.sitecore.net/Downloads.aspx | x_refsource_MISC | |
https://www.synacktiv.com/blog.html | x_refsource_MISC | |
https://www.synacktiv.com/ressources/advisories/Sitecore_CSRF_deserialize_RCE.pdf | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T22:01:55.184Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://dev.sitecore.net/Downloads.aspx" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.synacktiv.com/blog.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.synacktiv.com/ressources/advisories/Sitecore_CSRF_deserialize_RCE.pdf" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2019-9874", "options": [ { "Exploitation": "active" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-03-26T20:22:10.699149Z", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2025-03-26", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2019-9874" }, "type": "kev" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-502", "description": "CWE-502 Deserialization of Untrusted Data", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-30T01:46:02.167Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "timeline": [ { "lang": "en", "time": "2025-03-26T00:00:00+00:00", "value": "CVE-2019-9874 added to CISA KEV" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Deserialization of Untrusted Data in the Sitecore.Security.AntiCSRF (aka anti CSRF) module in Sitecore CMS 7.0 to 7.2 and Sitecore XP 7.5 to 8.2 allows an unauthenticated attacker to execute arbitrary code by sending a serialized .NET object in the HTTP POST parameter __CSRFTOKEN." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-05-31T20:11:49.000Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://dev.sitecore.net/Downloads.aspx" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.synacktiv.com/blog.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.synacktiv.com/ressources/advisories/Sitecore_CSRF_deserialize_RCE.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-9874", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Deserialization of Untrusted Data in the Sitecore.Security.AntiCSRF (aka anti CSRF) module in Sitecore CMS 7.0 to 7.2 and Sitecore XP 7.5 to 8.2 allows an unauthenticated attacker to execute arbitrary code by sending a serialized .NET object in the HTTP POST parameter __CSRFTOKEN." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://dev.sitecore.net/Downloads.aspx", "refsource": "MISC", "url": "https://dev.sitecore.net/Downloads.aspx" }, { "name": "https://www.synacktiv.com/blog.html", "refsource": "MISC", "url": "https://www.synacktiv.com/blog.html" }, { "name": "https://www.synacktiv.com/ressources/advisories/Sitecore_CSRF_deserialize_RCE.pdf", "refsource": "MISC", "url": "https://www.synacktiv.com/ressources/advisories/Sitecore_CSRF_deserialize_RCE.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-9874", "datePublished": "2019-05-31T20:11:49.000Z", "dateReserved": "2019-03-19T00:00:00.000Z", "dateUpdated": "2025-07-30T01:46:02.167Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-33653 (GCVE-0-2023-33653)
Vulnerability from cvelistv5
Published
2023-06-06 00:00
Modified
2025-01-08 16:10
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Sitecore Experience Platform (XP) v9.3 was discovered to contain an authenticated remote code execution (RCE) vulnerability via the component /Applications/Content%20Manager/Execute.aspx?cmd=convert&mode=HTML.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T15:47:06.515Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://blog.assetnote.io/2023/05/10/sitecore-round-two/" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-33653", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-01-08T16:10:43.055111Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-noinfo Not enough information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-08T16:10:50.393Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Sitecore Experience Platform (XP) v9.3 was discovered to contain an authenticated remote code execution (RCE) vulnerability via the component /Applications/Content%20Manager/Execute.aspx?cmd=convert\u0026mode=HTML." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-06T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://blog.assetnote.io/2023/05/10/sitecore-round-two/" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-33653", "datePublished": "2023-06-06T00:00:00", "dateReserved": "2023-05-22T00:00:00", "dateUpdated": "2025-01-08T16:10:50.393Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-42237 (GCVE-0-2021-42237)
Vulnerability from cvelistv5
Published
2021-11-05 09:51
Modified
2025-07-30 01:37
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Sitecore XP 7.5 Initial Release to Sitecore XP 8.2 Update-7 is vulnerable to an insecure deserialization attack where it is possible to achieve remote command execution on the machine. No authentication or special configuration is required to exploit this vulnerability.
References
▼ | URL | Tags |
---|---|---|
http://sitecore.com | x_refsource_MISC | |
https://support.sitecore.com/kb?id=kb_article_view&sysparm_article=KB1000776 | x_refsource_MISC | |
https://blog.assetnote.io/2021/11/02/sitecore-rce/ | x_refsource_MISC | |
http://packetstormsecurity.com/files/164988/Sitecore-Experience-Platform-XP-Remote-Code-Execution.html | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T03:30:37.679Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://sitecore.com" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.sitecore.com/kb?id=kb_article_view\u0026sysparm_article=KB1000776" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://blog.assetnote.io/2021/11/02/sitecore-rce/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/164988/Sitecore-Experience-Platform-XP-Remote-Code-Execution.html" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2021-42237", "options": [ { "Exploitation": "active" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-02-03T14:09:16.771279Z", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2022-03-25", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-42237" }, "type": "kev" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-502", "description": "CWE-502 Deserialization of Untrusted Data", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-30T01:37:54.377Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "timeline": [ { "lang": "en", "time": "2022-03-25T00:00:00+00:00", "value": "CVE-2021-42237 added to CISA KEV" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Sitecore XP 7.5 Initial Release to Sitecore XP 8.2 Update-7 is vulnerable to an insecure deserialization attack where it is possible to achieve remote command execution on the machine. No authentication or special configuration is required to exploit this vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-16T17:06:15.000Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://sitecore.com" }, { "tags": [ "x_refsource_MISC" ], "url": "https://support.sitecore.com/kb?id=kb_article_view\u0026sysparm_article=KB1000776" }, { "tags": [ "x_refsource_MISC" ], "url": "https://blog.assetnote.io/2021/11/02/sitecore-rce/" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/164988/Sitecore-Experience-Platform-XP-Remote-Code-Execution.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-42237", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Sitecore XP 7.5 Initial Release to Sitecore XP 8.2 Update-7 is vulnerable to an insecure deserialization attack where it is possible to achieve remote command execution on the machine. No authentication or special configuration is required to exploit this vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://sitecore.com", "refsource": "MISC", "url": "http://sitecore.com" }, { "name": "https://support.sitecore.com/kb?id=kb_article_view\u0026sysparm_article=KB1000776", "refsource": "MISC", "url": "https://support.sitecore.com/kb?id=kb_article_view\u0026sysparm_article=KB1000776" }, { "name": "https://blog.assetnote.io/2021/11/02/sitecore-rce/", "refsource": "MISC", "url": "https://blog.assetnote.io/2021/11/02/sitecore-rce/" }, { "name": "http://packetstormsecurity.com/files/164988/Sitecore-Experience-Platform-XP-Remote-Code-Execution.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/164988/Sitecore-Experience-Platform-XP-Remote-Code-Execution.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-42237", "datePublished": "2021-11-05T09:51:18.000Z", "dateReserved": "2021-10-11T00:00:00.000Z", "dateUpdated": "2025-07-30T01:37:54.377Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-53690 (GCVE-0-2025-53690)
Vulnerability from cvelistv5
Published
2025-09-03 20:04
Modified
2025-09-05 03:55
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-502 - Deserialization of Untrusted Data
Summary
Deserialization of Untrusted Data vulnerability in Sitecore Experience Manager (XM), Sitecore Experience Platform (XP) allows Code Injection.This issue affects Experience Manager (XM): through 9.0; Experience Platform (XP): through 9.0.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | Sitecore | Experience Manager (XM) |
Version: 0 ≤ 9.0 |
||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-53690", "options": [ { "Exploitation": "active" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-09-03T00:00:00+00:00", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2025-09-04", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-53690" }, "type": "kev" } } ], "providerMetadata": { "dateUpdated": "2025-09-05T03:55:32.039Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "timeline": [ { "lang": "en", "time": "2025-09-04T00:00:00+00:00", "value": "CVE-2025-53690 added to CISA KEV" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Experience Manager (XM)", "vendor": "Sitecore", "versions": [ { "lessThanOrEqual": "9.0", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "Experience Platform (XP)", "vendor": "Sitecore", "versions": [ { "lessThanOrEqual": "9.0", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "configurations": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(254, 254, 254);\"\u003eCustomers who followed the deployment instructions provided with XP 9.0 or earlier and Active Directory 1.4 or earlier and used the sample machine key (for example, machine key: BDDFE367CD..., validation key: 0DAC68D020...) are vulnerable.\u003c/span\u003e\u003cbr\u003e" } ], "value": "Customers who followed the deployment instructions provided with XP 9.0 or earlier and Active Directory 1.4 or earlier and used the sample machine key (for example, machine key: BDDFE367CD..., validation key: 0DAC68D020...) are vulnerable." } ], "credits": [ { "lang": "en", "type": "finder", "value": "Mandiant Threat Defense" } ], "datePublic": "2025-09-03T18:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Deserialization of Untrusted Data vulnerability in Sitecore Experience Manager (XM), Sitecore Experience Platform (XP) allows Code Injection.\u003cp\u003eThis issue affects Experience Manager (XM): through 9.0; Experience Platform (XP): through 9.0.\u003c/p\u003e" } ], "value": "Deserialization of Untrusted Data vulnerability in Sitecore Experience Manager (XM), Sitecore Experience Platform (XP) allows Code Injection.This issue affects Experience Manager (XM): through 9.0; Experience Platform (XP): through 9.0." } ], "impacts": [ { "capecId": "CAPEC-242", "descriptions": [ { "lang": "en", "value": "CAPEC-242 Code Injection" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-502", "description": "CWE-502 Deserialization of Untrusted Data", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-03T20:04:48.223Z", "orgId": "9947ef80-c5d5-474a-bbab-97341a59000e", "shortName": "Wiz" }, "references": [ { "url": "https://cloud.google.com/blog/topics/threat-intelligence/viewstate-deserialization-zero-day-vulnerability" }, { "url": "https://support.sitecore.com/kb?id=kb_article_view\u0026sysparm_article=KB1003865" } ], "source": { "discovery": "USER" }, "title": "Sitecore Products ViewState Deserialization Vulnerability", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "9947ef80-c5d5-474a-bbab-97341a59000e", "assignerShortName": "Wiz", "cveId": "CVE-2025-53690", "datePublished": "2025-09-03T20:04:48.223Z", "dateReserved": "2025-07-08T14:21:02.028Z", "dateUpdated": "2025-09-05T03:55:32.039Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-26262 (GCVE-0-2023-26262)
Vulnerability from cvelistv5
Published
2023-03-14 00:00
Modified
2025-02-27 20:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
An issue was discovered in Sitecore XP/XM 10.3. As an authenticated Sitecore user, a unrestricted language file upload vulnerability exists the can lead to direct code execution on the content management (CM) server.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T11:46:23.411Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.sitecore.com/trust" }, { "tags": [ "x_transferred" ], "url": "https://github.com/istern/CVE-2023-26262" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-26262", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-02-27T20:17:19.076014Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-434", "description": "CWE-434 Unrestricted Upload of File with Dangerous Type", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-27T20:17:51.109Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Sitecore XP/XM 10.3. As an authenticated Sitecore user, a unrestricted language file upload vulnerability exists the can lead to direct code execution on the content management (CM) server." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-14T00:00:00.000Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://www.sitecore.com/trust" }, { "url": "https://github.com/istern/CVE-2023-26262" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-26262", "datePublished": "2023-03-14T00:00:00.000Z", "dateReserved": "2023-02-21T00:00:00.000Z", "dateUpdated": "2025-02-27T20:17:51.109Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-53691 (GCVE-0-2025-53691)
Vulnerability from cvelistv5
Published
2025-09-03 12:36
Modified
2025-09-03 13:49
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-502 - Deserialization of Untrusted Data
Summary
Deserialization of Untrusted Data vulnerability in Sitecore Experience Manager (XM), Sitecore Experience Platform (XP) allows Remote Code Execution (RCE).This issue affects Experience Manager (XM): from 9.0 through 9.3, from 10.0 through 10.4; Experience Platform (XP): from 9.0 through 9.3, from 10.0 through 10.4.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | Sitecore | Experience Manager (XM) |
Version: 9.0 ≤ 9.3 Version: 10.0 ≤ 10.4 |
||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-53691", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-09-03T13:49:10.233307Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-09-03T13:49:39.605Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Experience Manager (XM)", "vendor": "Sitecore", "versions": [ { "lessThanOrEqual": "9.3", "status": "affected", "version": "9.0", "versionType": "semver" }, { "lessThanOrEqual": "10.4", "status": "affected", "version": "10.0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "Experience Platform (XP)", "vendor": "Sitecore", "versions": [ { "lessThanOrEqual": "9.3", "status": "affected", "version": "9.0", "versionType": "semver" }, { "lessThanOrEqual": "10.4", "status": "affected", "version": "10.0", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Piotr Bazydlo of watchTowr" } ], "datePublic": "2025-09-03T11:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Deserialization of Untrusted Data vulnerability in Sitecore Experience Manager (XM), Sitecore Experience Platform (XP) allows Remote Code Execution (RCE).\u003cp\u003eThis issue affects Experience Manager (XM): from 9.0 through 9.3, from 10.0 through 10.4; Experience Platform (XP): from 9.0 through 9.3, from 10.0 through 10.4.\u003c/p\u003e" } ], "value": "Deserialization of Untrusted Data vulnerability in Sitecore Experience Manager (XM), Sitecore Experience Platform (XP) allows Remote Code Execution (RCE).This issue affects Experience Manager (XM): from 9.0 through 9.3, from 10.0 through 10.4; Experience Platform (XP): from 9.0 through 9.3, from 10.0 through 10.4." } ], "impacts": [ { "capecId": "CAPEC-242", "descriptions": [ { "lang": "en", "value": "CAPEC-242 Code Injection" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-502", "description": "CWE-502 Deserialization of Untrusted Data", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-03T12:36:59.561Z", "orgId": "9947ef80-c5d5-474a-bbab-97341a59000e", "shortName": "Wiz" }, "references": [ { "url": "https://labs.watchtowr.com/cache-me-if-you-can-sitecore-experience-platform-cache-poisoning-to-rce/" }, { "url": "https://support.sitecore.com/kb?id=kb_article_view\u0026sysparm_article=KB1003667" } ], "source": { "discovery": "EXTERNAL" }, "title": "Sitecore Experience Remote Code Execution through Insecure Deserialization", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "9947ef80-c5d5-474a-bbab-97341a59000e", "assignerShortName": "Wiz", "cveId": "CVE-2025-53691", "datePublished": "2025-09-03T12:36:59.561Z", "dateReserved": "2025-07-08T14:21:02.029Z", "dateUpdated": "2025-09-03T13:49:39.605Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-53694 (GCVE-0-2025-53694)
Vulnerability from cvelistv5
Published
2025-09-03 12:36
Modified
2025-09-03 13:57
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
Summary
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Sitecore Sitecore Experience Manager (XM), Sitecore Experience Platform (XP).This issue affects Sitecore Experience Manager (XM): from 9.2 through 10.4; Experience Platform (XP): from 9.2 through 10.4.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | Sitecore | Sitecore Experience Manager (XM) |
Version: 9.2 ≤ 10.4 |
||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-53694", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-09-03T13:57:48.453027Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-09-03T13:57:58.828Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Sitecore Experience Manager (XM)", "vendor": "Sitecore", "versions": [ { "lessThanOrEqual": "10.4", "status": "affected", "version": "9.2", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "Experience Platform (XP)", "vendor": "Sitecore", "versions": [ { "lessThanOrEqual": "10.4", "status": "affected", "version": "9.2", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Piotr Bazydlo of watchTowr" } ], "datePublic": "2025-09-03T11:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Sitecore Sitecore Experience Manager (XM), Sitecore Experience Platform (XP).\u003cp\u003eThis issue affects Sitecore Experience Manager (XM): from 9.2 through 10.4; Experience Platform (XP): from 9.2 through 10.4.\u003c/p\u003e" } ], "value": "Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Sitecore Sitecore Experience Manager (XM), Sitecore Experience Platform (XP).This issue affects Sitecore Experience Manager (XM): from 9.2 through 10.4; Experience Platform (XP): from 9.2 through 10.4." } ], "impacts": [ { "capecId": "CAPEC-112", "descriptions": [ { "lang": "en", "value": "CAPEC-112 Brute Force" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-03T12:36:37.520Z", "orgId": "9947ef80-c5d5-474a-bbab-97341a59000e", "shortName": "Wiz" }, "references": [ { "url": "https://labs.watchtowr.com/cache-me-if-you-can-sitecore-experience-platform-cache-poisoning-to-rce/" }, { "url": "https://support.sitecore.com/kb?id=kb_article_view\u0026sysparm_article=KB1003734" } ], "source": { "discovery": "EXTERNAL" }, "title": "Information Disclosure in ItemServices API", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "9947ef80-c5d5-474a-bbab-97341a59000e", "assignerShortName": "Wiz", "cveId": "CVE-2025-53694", "datePublished": "2025-09-03T12:36:37.520Z", "dateReserved": "2025-07-08T14:21:02.029Z", "dateUpdated": "2025-09-03T13:57:58.828Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-27067 (GCVE-0-2023-27067)
Vulnerability from cvelistv5
Published
2023-05-22 00:00
Modified
2025-01-31 13:54
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Directory Traversal vulnerability in Sitecore Experience Platform through 10.2 allows remote attackers to download arbitrary files via crafted command to download.aspx
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T12:01:32.243Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://dev.sitecore.net/Downloads/Sitecore%20Experience%20Platform/103/Sitecore%20Experience%20Platform%20103/Release%20Notes" }, { "tags": [ "x_transferred" ], "url": "https://blogs.night-wolf.io/0-day-vulnerabilities-at-sitecore-pagedesigner" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-27067", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-21T17:27:07.135308Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-31T13:54:35.485Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Directory Traversal vulnerability in Sitecore Experience Platform through 10.2 allows remote attackers to download arbitrary files via crafted command to download.aspx" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-22T00:00:00.000Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://dev.sitecore.net/Downloads/Sitecore%20Experience%20Platform/103/Sitecore%20Experience%20Platform%20103/Release%20Notes" }, { "url": "https://blogs.night-wolf.io/0-day-vulnerabilities-at-sitecore-pagedesigner" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-27067", "datePublished": "2023-05-22T00:00:00.000Z", "dateReserved": "2023-02-27T00:00:00.000Z", "dateUpdated": "2025-01-31T13:54:35.485Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-8855 (GCVE-0-2016-8855)
Vulnerability from cvelistv5
Published
2017-03-19 18:00
Modified
2024-08-06 02:35
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Cross-Site Scripting (XSS) in "/sitecore/client/Applications/List Manager/Taskpages/Contact list" in Sitecore Experience Platform 8.1 rev. 160519 (8.1 Update-3) allows remote attacks via the Name or Description parameter. This is fixed in 8.2 Update-2.
References
▼ | URL | Tags |
---|---|---|
https://www.exploit-db.com/exploits/41618/ | exploit, x_refsource_EXPLOIT-DB | |
https://packetstormsecurity.com/files/141655/Sitecore-Experience-Platform-8.1-Update-3-Cross-Site-Scripting.html | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T02:35:02.225Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "41618", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/41618/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://packetstormsecurity.com/files/141655/Sitecore-Experience-Platform-8.1-Update-3-Cross-Site-Scripting.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-03-19T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-Site Scripting (XSS) in \"/sitecore/client/Applications/List Manager/Taskpages/Contact list\" in Sitecore Experience Platform 8.1 rev. 160519 (8.1 Update-3) allows remote attacks via the Name or Description parameter. This is fixed in 8.2 Update-2." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-03-19T16:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "41618", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/41618/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://packetstormsecurity.com/files/141655/Sitecore-Experience-Platform-8.1-Update-3-Cross-Site-Scripting.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2016-8855", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-Site Scripting (XSS) in \"/sitecore/client/Applications/List Manager/Taskpages/Contact list\" in Sitecore Experience Platform 8.1 rev. 160519 (8.1 Update-3) allows remote attacks via the Name or Description parameter. This is fixed in 8.2 Update-2." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "41618", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/41618/" }, { "name": "https://packetstormsecurity.com/files/141655/Sitecore-Experience-Platform-8.1-Update-3-Cross-Site-Scripting.html", "refsource": "MISC", "url": "https://packetstormsecurity.com/files/141655/Sitecore-Experience-Platform-8.1-Update-3-Cross-Site-Scripting.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2016-8855", "datePublished": "2017-03-19T18:00:00", "dateReserved": "2016-10-18T00:00:00", "dateUpdated": "2024-08-06T02:35:02.225Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-27066 (GCVE-0-2023-27066)
Vulnerability from cvelistv5
Published
2023-05-22 00:00
Modified
2025-01-31 13:51
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Directory Traversal vulnerability in Site Core Experience Platform 10.2 and earlier allows authenticated remote attackers to download arbitrary files via Urlhandle.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T12:01:32.199Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://dev.sitecore.net/Downloads/Sitecore%20Experience%20Platform/103/Sitecore%20Experience%20Platform%20103/Release%20Notes" }, { "tags": [ "x_transferred" ], "url": "https://blogs.night-wolf.io/0-day-vulnerabilities-at-sitecore-pagedesigner" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-27066", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-21T17:29:49.254867Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-31T13:51:25.964Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Directory Traversal vulnerability in Site Core Experience Platform 10.2 and earlier allows authenticated remote attackers to download arbitrary files via Urlhandle." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-22T00:00:00.000Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://dev.sitecore.net/Downloads/Sitecore%20Experience%20Platform/103/Sitecore%20Experience%20Platform%20103/Release%20Notes" }, { "url": "https://blogs.night-wolf.io/0-day-vulnerabilities-at-sitecore-pagedesigner" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-27066", "datePublished": "2023-05-22T00:00:00.000Z", "dateReserved": "2023-02-27T00:00:00.000Z", "dateUpdated": "2025-01-31T13:51:25.964Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-34509 (GCVE-0-2025-34509)
Vulnerability from cvelistv5
Published
2025-06-17 18:20
Modified
2025-07-22 13:07
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-798 - Use of Hard-coded Credentials
Summary
Sitecore Experience Manager (XM) and Experience Platform (XP) versions 10.1 to 10.1.4 rev. 011974 PRE, all versions of 10.2, 10.3 to 10.3.3 rev. 011967 PRE, and 10.4 to 10.4.1 rev. 011941 PRE contain a hardcoded user account. Unauthenticated and remote attackers can use this account to access administrative API over HTTP.
References
▼ | URL | Tags |
---|---|---|
https://labs.watchtowr.com/is-b-for-backdoor-pre-auth-rce-chain-in-sitecore-experience-platform/ | third-party-advisory, exploit, technical-description | |
https://support.sitecore.com/kb?id=kb_article_view&sysparm_article=KB1003667 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | Sitecore | Experience Manager |
Version: 10.4 < 10.4.1 rev. 011941 PRE Version: 10.3 < 10.3.3 rev. 011967 PRE Version: 10.1 < 10.1.4 rev. 011974 PRE |
||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-34509", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-06-17T00:00:00+00:00", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-18T03:56:09.729Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Experience Manager", "vendor": "Sitecore", "versions": [ { "lessThan": "10.4.1 rev. 011941 PRE", "status": "affected", "version": "10.4", "versionType": "custom" }, { "lessThan": "10.3.3 rev. 011967 PRE", "status": "affected", "version": "10.3", "versionType": "custom" }, { "lessThan": "10.1.4 rev. 011974 PRE", "status": "affected", "version": "10.1", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "Experience Platform", "vendor": "Sitecore", "versions": [ { "lessThan": "10.4.1 rev. 011941 PRE", "status": "affected", "version": "10.4", "versionType": "custom" }, { "lessThan": "10.3.3 rev. 011967 PRE", "status": "affected", "version": "10.3", "versionType": "custom" }, { "lessThan": "10.1.4 rev. 011974 PRE", "status": "affected", "version": "10.1", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Piotr Bazydlo of watchTowr" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Sitecore Experience Manager (XM) and Experience Platform (XP) versions 10.1 to 10.1.4 rev. 011974 PRE, all versions of 10.2, 10.3 to 10.3.3 rev. 011967 PRE, and 10.4 to 10.4.1 rev. 011941 PRE contain a hardcoded user account. Unauthenticated and remote attackers can use this account to access administrative API over HTTP." } ], "value": "Sitecore Experience Manager (XM) and Experience Platform (XP) versions 10.1 to 10.1.4 rev. 011974 PRE, all versions of 10.2, 10.3 to 10.3.3 rev. 011967 PRE, and 10.4 to 10.4.1 rev. 011941 PRE contain a hardcoded user account. Unauthenticated and remote attackers can use this account to access administrative API over HTTP." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-798", "description": "CWE-798 Use of Hard-coded Credentials", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-22T13:07:15.476Z", "orgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10", "shortName": "VulnCheck" }, "references": [ { "tags": [ "third-party-advisory", "exploit", "technical-description" ], "url": "https://labs.watchtowr.com/is-b-for-backdoor-pre-auth-rce-chain-in-sitecore-experience-platform/" }, { "tags": [ "vendor-advisory" ], "url": "https://support.sitecore.com/kb?id=kb_article_view\u0026sysparm_article=KB1003667" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Update to patched versions." } ], "value": "Update to patched versions." } ], "source": { "discovery": "EXTERNAL" }, "title": "Sitecore XM and XP Hardcoded Credentials", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10", "assignerShortName": "VulnCheck", "cveId": "CVE-2025-34509", "datePublished": "2025-06-17T18:20:57.441Z", "dateReserved": "2025-04-15T19:15:22.612Z", "dateUpdated": "2025-07-22T13:07:15.476Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-53693 (GCVE-0-2025-53693)
Vulnerability from cvelistv5
Published
2025-09-03 12:36
Modified
2025-09-03 13:53
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-470 - Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')
Summary
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') vulnerability in Sitecore Sitecore Experience Manager (XM), Sitecore Experience Platform (XP) allows Cache Poisoning.This issue affects Sitecore Experience Manager (XM): from 9.0 through 9.3, from 10.0 through 10.4; Experience Platform (XP): from 9.0 through 9.3, from 10.0 through 10.4.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | Sitecore | Sitecore Experience Manager (XM) |
Version: 9.0 ≤ 9.3 Version: 10.0 ≤ 10.4 |
||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-53693", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-09-03T13:49:59.488662Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-09-03T13:53:40.699Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Sitecore Experience Manager (XM)", "vendor": "Sitecore", "versions": [ { "lessThanOrEqual": "9.3", "status": "affected", "version": "9.0", "versionType": "semver" }, { "lessThanOrEqual": "10.4", "status": "affected", "version": "10.0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "Experience Platform (XP)", "vendor": "Sitecore", "versions": [ { "lessThanOrEqual": "9.3", "status": "affected", "version": "9.0", "versionType": "semver" }, { "lessThanOrEqual": "10.4", "status": "affected", "version": "10.0", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Piotr Bazydlo of watchTowr" } ], "datePublic": "2025-09-03T11:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Use of Externally-Controlled Input to Select Classes or Code (\u0027Unsafe Reflection\u0027) vulnerability in Sitecore Sitecore Experience Manager (XM), Sitecore Experience Platform (XP) allows Cache Poisoning.\u003cp\u003eThis issue affects Sitecore Experience Manager (XM): from 9.0 through 9.3, from 10.0 through 10.4; Experience Platform (XP): from 9.0 through 9.3, from 10.0 through 10.4.\u003c/p\u003e" } ], "value": "Use of Externally-Controlled Input to Select Classes or Code (\u0027Unsafe Reflection\u0027) vulnerability in Sitecore Sitecore Experience Manager (XM), Sitecore Experience Platform (XP) allows Cache Poisoning.This issue affects Sitecore Experience Manager (XM): from 9.0 through 9.3, from 10.0 through 10.4; Experience Platform (XP): from 9.0 through 9.3, from 10.0 through 10.4." } ], "impacts": [ { "capecId": "CAPEC-141", "descriptions": [ { "lang": "en", "value": "CAPEC-141 Cache Poisoning" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-470", "description": "CWE-470 Use of Externally-Controlled Input to Select Classes or Code (\u0027Unsafe Reflection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-03T12:36:53.745Z", "orgId": "9947ef80-c5d5-474a-bbab-97341a59000e", "shortName": "Wiz" }, "references": [ { "url": "https://labs.watchtowr.com/cache-me-if-you-can-sitecore-experience-platform-cache-poisoning-to-rce/" }, { "url": "https://support.sitecore.com/kb?id=kb_article_view\u0026sysparm_article=KB1003667" } ], "source": { "discovery": "EXTERNAL" }, "title": "HTML Cache Poisoning through Unsafe Reflections", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "9947ef80-c5d5-474a-bbab-97341a59000e", "assignerShortName": "Wiz", "cveId": "CVE-2025-53693", "datePublished": "2025-09-03T12:36:53.745Z", "dateReserved": "2025-07-08T14:21:02.029Z", "dateUpdated": "2025-09-03T13:53:40.699Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-33651 (GCVE-0-2023-33651)
Vulnerability from cvelistv5
Published
2023-06-06 00:00
Modified
2025-01-08 16:14
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
An issue in the MVC Device Simulator of Sitecore Experience Platform (XP), Experience Manager (XM), and Experience Commerce (XC) v9.0 Initial Release to v13.0 Initial Release allows attackers to bypass authorization rules.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T15:47:06.520Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://blog.assetnote.io/2023/05/10/sitecore-round-two/" }, { "tags": [ "x_transferred" ], "url": "https://support.sitecore.com/kb?id=kb_article_view\u0026sysparm_article=KB1002925" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-33651", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-08T16:12:41.707251Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-863", "description": "CWE-863 Incorrect Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-08T16:14:58.802Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue in the MVC Device Simulator of Sitecore Experience Platform (XP), Experience Manager (XM), and Experience Commerce (XC) v9.0 Initial Release to v13.0 Initial Release allows attackers to bypass authorization rules." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-06T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://blog.assetnote.io/2023/05/10/sitecore-round-two/" }, { "url": "https://support.sitecore.com/kb?id=kb_article_view\u0026sysparm_article=KB1002925" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-33651", "datePublished": "2023-06-06T00:00:00", "dateReserved": "2023-05-22T00:00:00", "dateUpdated": "2025-01-08T16:14:58.802Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-34510 (GCVE-0-2025-34510)
Vulnerability from cvelistv5
Published
2025-06-17 18:46
Modified
2025-06-26 19:26
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-23 - Relative Path Traversal
Summary
Sitecore Experience Manager (XM), Experience Platform (XP), and Experience Commerce (XC) versions 9.0 through 9.3 and 10.0 through 10.4 are affected by a Zip Slip vulnerability. A remote, authenticated attacker can exploit this issue by sending a crafted HTTP request to upload a ZIP archive containing path traversal sequences, allowing arbitrary file writes and leading to code execution.
References
▼ | URL | Tags |
---|---|---|
https://labs.watchtowr.com/is-b-for-backdoor-pre-auth-rce-chain-in-sitecore-experience-platform/ | third-party-advisory, exploit, technical-description | |
https://support.sitecore.com/kb?id=kb_article_view&sysparm_article=KB1003667 | vendor-advisory |
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Sitecore | Experience Manager |
Version: 9.0 < Version: 10.0 < |
|||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-34510", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-06-18T03:56:12.568004Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-26T19:26:12.608Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Experience Manager", "vendor": "Sitecore", "versions": [ { "lessThanOrEqual": "9.3", "status": "affected", "version": "9.0", "versionType": "custom" }, { "lessThanOrEqual": "10.4", "status": "affected", "version": "10.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "Experience Platform", "vendor": "Sitecore", "versions": [ { "lessThanOrEqual": "9.3", "status": "affected", "version": "9.0", "versionType": "custom" }, { "lessThanOrEqual": "10.4", "status": "affected", "version": "10.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "Experience Commerce", "vendor": "Sitecore", "versions": [ { "lessThanOrEqual": "9.3", "status": "affected", "version": "9.0", "versionType": "custom" }, { "lessThanOrEqual": "10.4", "status": "affected", "version": "10.0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Piotr Bazydlo of watchTowr" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Sitecore Experience Manager (XM), Experience Platform (XP), and Experience Commerce (XC) versions 9.0 through 9.3 and 10.0 through 10.4 are affected by a Zip Slip vulnerability. A remote, authenticated attacker can exploit this issue by sending a crafted HTTP request to upload a ZIP archive containing path traversal sequences, allowing arbitrary file writes and leading to code execution." } ], "value": "Sitecore Experience Manager (XM), Experience Platform (XP), and Experience Commerce (XC) versions 9.0 through 9.3 and 10.0 through 10.4 are affected by a Zip Slip vulnerability. A remote, authenticated attacker can exploit this issue by sending a crafted HTTP request to upload a ZIP archive containing path traversal sequences, allowing arbitrary file writes and leading to code execution." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-23", "description": "CWE-23: Relative Path Traversal", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-17T19:07:50.830Z", "orgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10", "shortName": "VulnCheck" }, "references": [ { "tags": [ "third-party-advisory", "exploit", "technical-description" ], "url": "https://labs.watchtowr.com/is-b-for-backdoor-pre-auth-rce-chain-in-sitecore-experience-platform/" }, { "tags": [ "vendor-advisory" ], "url": "https://support.sitecore.com/kb?id=kb_article_view\u0026sysparm_article=KB1003667" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Apply the vendor provided hotpatch." } ], "value": "Apply the vendor provided hotpatch." } ], "source": { "discovery": "EXTERNAL" }, "title": "Sitecore XM, XC, and XP Post-Auth RCE via Zip Slip", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10", "assignerShortName": "VulnCheck", "cveId": "CVE-2025-34510", "datePublished": "2025-06-17T18:46:04.239Z", "dateReserved": "2025-04-15T19:15:22.612Z", "dateUpdated": "2025-06-26T19:26:12.608Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-34511 (GCVE-0-2025-34511)
Vulnerability from cvelistv5
Published
2025-06-17 19:05
Modified
2025-07-22 13:08
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-434 - Unrestricted Upload of File with Dangerous Type
Summary
Sitecore PowerShell Extensions, an add-on to Sitecore Experience Manager (XM) and Experience Platform (XP), through version 7.0 is vulnerable to an unrestricted file upload issue. A remote, authenticated attacker can upload arbitrary files to the server using crafted HTTP requests, resulting in remote code execution.
References
▼ | URL | Tags |
---|---|---|
https://labs.watchtowr.com/is-b-for-backdoor-pre-auth-rce-chain-in-sitecore-experience-platform/ | third-party-advisory, exploit, technical-description | |
https://support.sitecore.com/kb?id=kb_article_view&sysparm_article=KB1003667 | vendor-advisory |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Sitecore | Powershell Extension |
Version: 0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-34511", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-06-17T00:00:00+00:00", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-18T03:56:10.770Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Powershell Extension", "vendor": "Sitecore", "versions": [ { "lessThanOrEqual": "7.0", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Piotr Bazydlo of watchTowr" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Sitecore PowerShell Extensions, an add-on to Sitecore Experience Manager (XM) and Experience Platform (XP), through version 7.0 is vulnerable to an unrestricted file upload issue. A remote, authenticated attacker can upload arbitrary files to the server using crafted HTTP requests, resulting in remote code execution." } ], "value": "Sitecore PowerShell Extensions, an add-on to Sitecore Experience Manager (XM) and Experience Platform (XP), through version 7.0 is vulnerable to an unrestricted file upload issue. A remote, authenticated attacker can upload arbitrary files to the server using crafted HTTP requests, resulting in remote code execution." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-434", "description": "CWE-434 Unrestricted Upload of File with Dangerous Type", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-22T13:08:26.043Z", "orgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10", "shortName": "VulnCheck" }, "references": [ { "tags": [ "third-party-advisory", "exploit", "technical-description" ], "url": "https://labs.watchtowr.com/is-b-for-backdoor-pre-auth-rce-chain-in-sitecore-experience-platform/" }, { "tags": [ "vendor-advisory" ], "url": "https://support.sitecore.com/kb?id=kb_article_view\u0026sysparm_article=KB1003667" } ], "source": { "discovery": "EXTERNAL" }, "title": "Sitecore PowerShell Extension RCE via Unrestricted Upload", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10", "assignerShortName": "VulnCheck", "cveId": "CVE-2025-34511", "datePublished": "2025-06-17T19:05:10.466Z", "dateReserved": "2025-04-15T19:15:22.612Z", "dateUpdated": "2025-07-22T13:08:26.043Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-13493 (GCVE-0-2019-13493)
Vulnerability from cvelistv5
Published
2019-07-17 19:10
Modified
2024-08-04 23:57
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
In Sitecore 9.0 rev 171002, Persistent XSS exists in the Media Library and File Manager. An authenticated unprivileged user can modify the uploaded file extension parameter to inject arbitrary JavaScript.
References
▼ | URL | Tags |
---|---|---|
http://packetstormsecurity.com/files/153613/Sitecore-9.0-Rev-171002-Cross-Site-Scripting.html | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T23:57:39.274Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/153613/Sitecore-9.0-Rev-171002-Cross-Site-Scripting.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In Sitecore 9.0 rev 171002, Persistent XSS exists in the Media Library and File Manager. An authenticated unprivileged user can modify the uploaded file extension parameter to inject arbitrary JavaScript." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-07-17T19:10:51", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/153613/Sitecore-9.0-Rev-171002-Cross-Site-Scripting.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-13493", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Sitecore 9.0 rev 171002, Persistent XSS exists in the Media Library and File Manager. An authenticated unprivileged user can modify the uploaded file extension parameter to inject arbitrary JavaScript." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://packetstormsecurity.com/files/153613/Sitecore-9.0-Rev-171002-Cross-Site-Scripting.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/153613/Sitecore-9.0-Rev-171002-Cross-Site-Scripting.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-13493", "datePublished": "2019-07-17T19:10:51", "dateReserved": "2019-07-10T00:00:00", "dateUpdated": "2024-08-04T23:57:39.274Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2023-06-06 19:15
Modified
2025-01-08 16:15
Severity ?
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Sitecore Experience Platform (XP) v9.3 was discovered to contain an authenticated remote code execution (RCE) vulnerability via the component /Applications/Content%20Manager/Execute.aspx?cmd=convert&mode=HTML.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://blog.assetnote.io/2023/05/10/sitecore-round-two/ | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://blog.assetnote.io/2023/05/10/sitecore-round-two/ | Exploit, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sitecore | experience_platform | 9.3 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sitecore:experience_platform:9.3:*:*:*:*:*:*:*", "matchCriteriaId": "94E94971-99B7-459A-A0B6-6FDBC397522D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sitecore Experience Platform (XP) v9.3 was discovered to contain an authenticated remote code execution (RCE) vulnerability via the component /Applications/Content%20Manager/Execute.aspx?cmd=convert\u0026mode=HTML." } ], "id": "CVE-2023-33653", "lastModified": "2025-01-08T16:15:30.680", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2023-06-06T19:15:12.287", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://blog.assetnote.io/2023/05/10/sitecore-round-two/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://blog.assetnote.io/2023/05/10/sitecore-round-two/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-05-22 17:15
Modified
2025-01-31 14:15
Severity ?
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Summary
Directory Traversal vulnerability in Site Core Experience Platform 10.2 and earlier allows authenticated remote attackers to download arbitrary files via Urlhandle.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sitecore | experience_platform | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sitecore:experience_platform:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B81DCF5-B6B4-48CF-9081-A5F148936AAF", "versionEndIncluding": "10.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Directory Traversal vulnerability in Site Core Experience Platform 10.2 and earlier allows authenticated remote attackers to download arbitrary files via Urlhandle." } ], "id": "CVE-2023-27066", "lastModified": "2025-01-31T14:15:29.787", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2023-05-22T17:15:09.347", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://blogs.night-wolf.io/0-day-vulnerabilities-at-sitecore-pagedesigner" }, { "source": "cve@mitre.org", "tags": [ "Release Notes" ], "url": "https://dev.sitecore.net/Downloads/Sitecore%20Experience%20Platform/103/Sitecore%20Experience%20Platform%20103/Release%20Notes" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://blogs.night-wolf.io/0-day-vulnerabilities-at-sitecore-pagedesigner" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://dev.sitecore.net/Downloads/Sitecore%20Experience%20Platform/103/Sitecore%20Experience%20Platform%20103/Release%20Notes" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2023-05-22 19:15
Modified
2025-01-31 14:15
Severity ?
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Summary
Directory Traversal vulnerability in Sitecore Experience Platform through 10.2 allows remote attackers to download arbitrary files via crafted command to download.aspx
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sitecore | experience_platform | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sitecore:experience_platform:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B81DCF5-B6B4-48CF-9081-A5F148936AAF", "versionEndIncluding": "10.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Directory Traversal vulnerability in Sitecore Experience Platform through 10.2 allows remote attackers to download arbitrary files via crafted command to download.aspx" } ], "id": "CVE-2023-27067", "lastModified": "2025-01-31T14:15:29.990", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2023-05-22T19:15:09.960", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://blogs.night-wolf.io/0-day-vulnerabilities-at-sitecore-pagedesigner" }, { "source": "cve@mitre.org", "tags": [ "Release Notes" ], "url": "https://dev.sitecore.net/Downloads/Sitecore%20Experience%20Platform/103/Sitecore%20Experience%20Platform%20103/Release%20Notes" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://blogs.night-wolf.io/0-day-vulnerabilities-at-sitecore-pagedesigner" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://dev.sitecore.net/Downloads/Sitecore%20Experience%20Platform/103/Sitecore%20Experience%20Platform%20103/Release%20Notes" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2017-03-19 18:59
Modified
2025-04-20 01:37
Severity ?
Summary
Cross-Site Scripting (XSS) in "/sitecore/client/Applications/List Manager/Taskpages/Contact list" in Sitecore Experience Platform 8.1 rev. 160519 (8.1 Update-3) allows remote attacks via the Name or Description parameter. This is fixed in 8.2 Update-2.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://packetstormsecurity.com/files/141655/Sitecore-Experience-Platform-8.1-Update-3-Cross-Site-Scripting.html | Exploit, Third Party Advisory, VDB Entry | |
cve@mitre.org | https://www.exploit-db.com/exploits/41618/ | Exploit, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://packetstormsecurity.com/files/141655/Sitecore-Experience-Platform-8.1-Update-3-Cross-Site-Scripting.html | Exploit, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.exploit-db.com/exploits/41618/ | Exploit, Third Party Advisory, VDB Entry |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sitecore | experience_platform | 8.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sitecore:experience_platform:8.1:rev._160519:*:*:*:*:*:*", "matchCriteriaId": "ABF6E372-F1C8-4AAA-A4AE-1581CFC2C795", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-Site Scripting (XSS) in \"/sitecore/client/Applications/List Manager/Taskpages/Contact list\" in Sitecore Experience Platform 8.1 rev. 160519 (8.1 Update-3) allows remote attacks via the Name or Description parameter. This is fixed in 8.2 Update-2." }, { "lang": "es", "value": "XSS en \"/sitecore/client/Applications/List Manager/Taskpages/Contact list\" en Sitecore Experience Platform 8.1 rev. 160519 (8.1 Update-3) permite ataques remotos a trav\u00e9s del par\u00e1metro Name o Description. Esto se soluciona en 8.2 Update-2." } ], "id": "CVE-2016-8855", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-03-19T18:59:00.163", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://packetstormsecurity.com/files/141655/Sitecore-Experience-Platform-8.1-Update-3-Cross-Site-Scripting.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/41618/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://packetstormsecurity.com/files/141655/Sitecore-Experience-Platform-8.1-Update-3-Cross-Site-Scripting.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/41618/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-05-23 01:15
Modified
2025-01-28 21:15
Severity ?
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
Deserialization of Untrusted Data in Sitecore Experience Platform through 10.2 allows remote attackers to run arbitrary code via ValidationResult.aspx.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sitecore | experience_platform | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sitecore:experience_platform:*:*:*:*:*:*:*:*", "matchCriteriaId": "B2C36257-4991-451B-9E79-FDAE6CD94178", "versionEndExcluding": "10.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Deserialization of Untrusted Data in Sitecore Experience Platform through 10.2 allows remote attackers to run arbitrary code via ValidationResult.aspx." } ], "id": "CVE-2023-27068", "lastModified": "2025-01-28T21:15:13.647", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2023-05-23T01:15:09.773", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://blogs.night-wolf.io/0-day-vulnerabilities-at-sitecore-pagedesigner" }, { "source": "cve@mitre.org", "tags": [ "Release Notes" ], "url": "https://dev.sitecore.net/Downloads/Sitecore%20Experience%20Platform/103/Sitecore%20Experience%20Platform%20103/Release%20Notes" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://www.sitecore.com/products/sitecore-experience-platform" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://blogs.night-wolf.io/0-day-vulnerabilities-at-sitecore-pagedesigner" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://dev.sitecore.net/Downloads/Sitecore%20Experience%20Platform/103/Sitecore%20Experience%20Platform%20103/Release%20Notes" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://www.sitecore.com/products/sitecore-experience-platform" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-502" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-502" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2021-11-05 10:15
Modified
2025-04-03 19:15
Severity ?
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
Sitecore XP 7.5 Initial Release to Sitecore XP 8.2 Update-7 is vulnerable to an insecure deserialization attack where it is possible to achieve remote command execution on the machine. No authentication or special configuration is required to exploit this vulnerability.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://packetstormsecurity.com/files/164988/Sitecore-Experience-Platform-XP-Remote-Code-Execution.html | Third Party Advisory, VDB Entry | |
cve@mitre.org | http://sitecore.com | Vendor Advisory | |
cve@mitre.org | https://blog.assetnote.io/2021/11/02/sitecore-rce/ | Exploit, Third Party Advisory | |
cve@mitre.org | https://support.sitecore.com/kb?id=kb_article_view&sysparm_article=KB1000776 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/164988/Sitecore-Experience-Platform-XP-Remote-Code-Execution.html | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://sitecore.com | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://blog.assetnote.io/2021/11/02/sitecore-rce/ | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.sitecore.com/kb?id=kb_article_view&sysparm_article=KB1000776 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sitecore | experience_platform | 7.5 | |
sitecore | experience_platform | 7.5 | |
sitecore | experience_platform | 7.5 | |
sitecore | experience_platform | 8.0 | |
sitecore | experience_platform | 8.0 | |
sitecore | experience_platform | 8.0 | |
sitecore | experience_platform | 8.0 | |
sitecore | experience_platform | 8.0 | |
sitecore | experience_platform | 8.0 | |
sitecore | experience_platform | 8.0 | |
sitecore | experience_platform | 8.0 | |
sitecore | experience_platform | 8.0 | |
sitecore | experience_platform | 8.1 | |
sitecore | experience_platform | 8.1 | |
sitecore | experience_platform | 8.1 | |
sitecore | experience_platform | 8.1 | |
sitecore | experience_platform | 8.2 | |
sitecore | experience_platform | 8.2 | |
sitecore | experience_platform | 8.2 | |
sitecore | experience_platform | 8.2 | |
sitecore | experience_platform | 8.2 | |
sitecore | experience_platform | 8.2 | |
sitecore | experience_platform | 8.2 | |
sitecore | experience_platform | 8.2 |
{ "cisaActionDue": "2022-04-15", "cisaExploitAdd": "2022-03-25", "cisaRequiredAction": "Apply updates per vendor instructions.", "cisaVulnerabilityName": "Sitecore XP Remote Command Execution Vulnerability", "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sitecore:experience_platform:7.5:-:*:*:*:*:*:*", "matchCriteriaId": "7DA5CB16-F850-41CC-9629-22A27A7D116B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sitecore:experience_platform:7.5:update1:*:*:*:*:*:*", "matchCriteriaId": "ADC6C446-A985-465A-9FBE-5FCEE9C6CBD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:sitecore:experience_platform:7.5:update2:*:*:*:*:*:*", "matchCriteriaId": "DB23F608-4B01-4D54-8A1E-E15BEE609FA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:sitecore:experience_platform:8.0:-:*:*:*:*:*:*", "matchCriteriaId": "BE208FB9-A66E-4073-AD2F-DC56FDBDE127", "vulnerable": true }, { "criteria": "cpe:2.3:a:sitecore:experience_platform:8.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "F6454C19-10B4-48C3-A263-9334E594164B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sitecore:experience_platform:8.0:update1:*:*:*:*:*:*", "matchCriteriaId": "E192728C-7ED3-4A49-953E-E123160965F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:sitecore:experience_platform:8.0:update2:*:*:*:*:*:*", "matchCriteriaId": "B59B52C9-788F-4F31-9426-001AEFAEB8F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sitecore:experience_platform:8.0:update3:*:*:*:*:*:*", "matchCriteriaId": "E4D47317-4E1F-4C2E-BD56-960BFD6947BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:sitecore:experience_platform:8.0:update4:*:*:*:*:*:*", "matchCriteriaId": "D36C9AB3-B22F-4C47-B92D-03D95E3C8137", "vulnerable": true }, { "criteria": "cpe:2.3:a:sitecore:experience_platform:8.0:update5:*:*:*:*:*:*", "matchCriteriaId": "F2DC3A72-1BAE-44C6-877A-8AC4398425A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sitecore:experience_platform:8.0:update6:*:*:*:*:*:*", "matchCriteriaId": "FB53F79E-FA06-423C-B9BC-96AF052726B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sitecore:experience_platform:8.0:update7:*:*:*:*:*:*", "matchCriteriaId": "08DD78DD-3686-48C9-A896-CF1CFDD2FCBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:sitecore:experience_platform:8.1:-:*:*:*:*:*:*", "matchCriteriaId": "C9362ED8-9012-4771-BED2-501921784E5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sitecore:experience_platform:8.1:update1:*:*:*:*:*:*", "matchCriteriaId": "47CB90D7-CC2C-4A5C-99DC-5C52A4A3E188", "vulnerable": true }, { "criteria": "cpe:2.3:a:sitecore:experience_platform:8.1:update2:*:*:*:*:*:*", "matchCriteriaId": "17E8CD1F-2D60-4E4A-BAA4-80165910058B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sitecore:experience_platform:8.1:update3:*:*:*:*:*:*", "matchCriteriaId": "B2B4B37E-265B-40BB-ADD9-856F751322C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:sitecore:experience_platform:8.2:-:*:*:*:*:*:*", "matchCriteriaId": "65E69221-68EE-4D8F-829B-12C96C197C0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sitecore:experience_platform:8.2:update1:*:*:*:*:*:*", "matchCriteriaId": "218E38E2-FBF3-4E75-8507-5BD425FA4F81", "vulnerable": true }, { "criteria": "cpe:2.3:a:sitecore:experience_platform:8.2:update2:*:*:*:*:*:*", "matchCriteriaId": "6C754113-6D8E-4B0D-872C-266088B27362", "vulnerable": true }, { "criteria": "cpe:2.3:a:sitecore:experience_platform:8.2:update3:*:*:*:*:*:*", "matchCriteriaId": "AA0A84E9-0B8D-4755-AF70-59207CEDCC08", "vulnerable": true }, { "criteria": "cpe:2.3:a:sitecore:experience_platform:8.2:update4:*:*:*:*:*:*", "matchCriteriaId": "2F73BF18-6D89-4663-AA37-56FC976A0EE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sitecore:experience_platform:8.2:update5:*:*:*:*:*:*", "matchCriteriaId": "D7CDCFB0-9C38-46CA-A2C3-6A18F4B9A224", "vulnerable": true }, { "criteria": "cpe:2.3:a:sitecore:experience_platform:8.2:update6:*:*:*:*:*:*", "matchCriteriaId": "496F293C-F7ED-411A-8498-9B93FDC350C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:sitecore:experience_platform:8.2:update7:*:*:*:*:*:*", "matchCriteriaId": "402BC64F-A66E-426B-ACB9-F65AB857006B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sitecore XP 7.5 Initial Release to Sitecore XP 8.2 Update-7 is vulnerable to an insecure deserialization attack where it is possible to achieve remote command execution on the machine. No authentication or special configuration is required to exploit this vulnerability." }, { "lang": "es", "value": "Sitecore XP Versi\u00f3n Inicial 7.5 a Sitecore XP 8.2 Update-7, es vulnerable a un ataque de deserializaci\u00f3n no segura donde es posible lograr una ejecuci\u00f3n de comandos remotos en la m\u00e1quina. No es requerida ninguna autenticaci\u00f3n ni configuraci\u00f3n especial para explotar esta vulnerabilidad" } ], "id": "CVE-2021-42237", "lastModified": "2025-04-03T19:15:55.907", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2021-11-05T10:15:08.240", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/164988/Sitecore-Experience-Platform-XP-Remote-Code-Execution.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://sitecore.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://blog.assetnote.io/2021/11/02/sitecore-rce/" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://support.sitecore.com/kb?id=kb_article_view\u0026sysparm_article=KB1000776" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/164988/Sitecore-Experience-Platform-XP-Remote-Code-Execution.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://sitecore.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://blog.assetnote.io/2021/11/02/sitecore-rce/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.sitecore.com/kb?id=kb_article_view\u0026sysparm_article=KB1000776" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-502" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-502" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2024-09-15 22:15
Modified
2024-09-20 18:15
Severity ?
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Summary
An issue was discovered in Sitecore Experience Platform (XP), Experience Manager (XM), and Experience Commerce (XC) 8.0 Initial Release through 10.4 Initial Release. An unauthenticated attacker can read arbitrary files.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://support.sitecore.com/kb?id=kb_article_view&sysparm_article=KB1003408 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sitecore | experience_commerce | * | |
sitecore | experience_manager | * | |
sitecore | experience_platform | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sitecore:experience_commerce:*:*:*:*:*:*:*:*", "matchCriteriaId": "ECEBBC2F-E760-4813-ACD5-32D6BB579B19", "versionEndIncluding": "10.4", "versionStartIncluding": "8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sitecore:experience_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA9161FD-6A0A-4CF5-908D-2EA3C4D05B22", "versionEndIncluding": "10.4", "versionStartIncluding": "8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sitecore:experience_platform:*:*:*:*:*:*:*:*", "matchCriteriaId": "8441881C-0793-49C8-8D8D-1BFF0D62E03F", "versionEndIncluding": "10.4", "versionStartIncluding": "8.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Sitecore Experience Platform (XP), Experience Manager (XM), and Experience Commerce (XC) 8.0 Initial Release through 10.4 Initial Release. An unauthenticated attacker can read arbitrary files." }, { "lang": "es", "value": "Se descubri\u00f3 un problema en Sitecore Experience Platform (XP), Experience Manager (XM) y Experience Commerce (XC) desde la versi\u00f3n inicial 8.0 hasta la versi\u00f3n inicial 10.4. Un atacante no autenticado puede leer archivos arbitrarios." } ], "id": "CVE-2024-46938", "lastModified": "2024-09-20T18:15:10.590", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2024-09-15T22:15:09.830", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://support.sitecore.com/kb?id=kb_article_view\u0026sysparm_article=KB1003408" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2025-09-03 20:15
Modified
2025-09-05 13:48
Severity ?
Summary
Deserialization of Untrusted Data vulnerability in Sitecore Experience Manager (XM), Sitecore Experience Platform (XP) allows Code Injection.This issue affects Experience Manager (XM): through 9.0; Experience Platform (XP): through 9.0.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sitecore | experience_commerce | * | |
sitecore | experience_manager | * | |
sitecore | experience_platform | * | |
sitecore | managed_cloud | - |
{ "cisaActionDue": "2025-09-25", "cisaExploitAdd": "2025-09-04", "cisaRequiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", "cisaVulnerabilityName": "Sitecore Multiple Products Deserialization of Untrusted Data Vulnerability", "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sitecore:experience_commerce:*:*:*:*:*:*:*:*", "matchCriteriaId": "40097CA2-94C2-4CBD-B94C-10B5A8F282FD", "versionEndIncluding": "9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sitecore:experience_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "96C832B3-FB9D-443A-A501-65BFF0A47092", "versionEndIncluding": "9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sitecore:experience_platform:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F60EDF8-6CCE-4440-A4FB-337FBFC881DD", "versionEndIncluding": "9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sitecore:managed_cloud:-:*:*:*:*:*:*:*", "matchCriteriaId": "520CF670-01A2-479F-B637-C413A82463E0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Deserialization of Untrusted Data vulnerability in Sitecore Experience Manager (XM), Sitecore Experience Platform (XP) allows Code Injection.This issue affects Experience Manager (XM): through 9.0; Experience Platform (XP): through 9.0." } ], "id": "CVE-2025-53690", "lastModified": "2025-09-05T13:48:28.540", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.0, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 6.0, "source": "9947ef80-c5d5-474a-bbab-97341a59000e", "type": "Secondary" } ] }, "published": "2025-09-03T20:15:33.473", "references": [ { "source": "9947ef80-c5d5-474a-bbab-97341a59000e", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://cloud.google.com/blog/topics/threat-intelligence/viewstate-deserialization-zero-day-vulnerability" }, { "source": "9947ef80-c5d5-474a-bbab-97341a59000e", "tags": [ "Vendor Advisory" ], "url": "https://support.sitecore.com/kb?id=kb_article_view\u0026sysparm_article=KB1003865" } ], "sourceIdentifier": "9947ef80-c5d5-474a-bbab-97341a59000e", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-502" } ], "source": "9947ef80-c5d5-474a-bbab-97341a59000e", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2025-06-17 19:15
Modified
2025-09-08 19:17
Severity ?
8.2 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Summary
Sitecore Experience Manager (XM) and Experience Platform (XP) versions 10.1 to 10.1.4 rev. 011974 PRE, all versions of 10.2, 10.3 to 10.3.3 rev. 011967 PRE, and 10.4 to 10.4.1 rev. 011941 PRE contain a hardcoded user account. Unauthenticated and remote attackers can use this account to access administrative API over HTTP.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sitecore | experience_commerce | * | |
sitecore | experience_manager | * | |
sitecore | experience_platform | * | |
sitecore | experience_platform | 10.4 | |
sitecore | managed_cloud | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sitecore:experience_commerce:*:*:*:*:*:*:*:*", "matchCriteriaId": "DCF77DC5-9DF9-4DF7-9636-69CA4BEEDB04", "versionEndIncluding": "10.4", "versionStartIncluding": "9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sitecore:experience_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "17EF29D0-E1DA-4F84-95F4-EA9680EB47DF", "versionEndIncluding": "10.4", "versionStartIncluding": "9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sitecore:experience_platform:*:*:*:*:*:*:*:*", "matchCriteriaId": "88455751-A525-4A59-9DD8-4E015CD1346C", "versionEndExcluding": "10.4", "versionStartIncluding": "9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sitecore:experience_platform:10.4:-:*:*:*:*:*:*", "matchCriteriaId": "78E71AD1-04C7-4D80-9A0A-E386A3FAC860", "vulnerable": true }, { "criteria": "cpe:2.3:a:sitecore:managed_cloud:-:*:*:*:*:*:*:*", "matchCriteriaId": "520CF670-01A2-479F-B637-C413A82463E0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sitecore Experience Manager (XM) and Experience Platform (XP) versions 10.1 to 10.1.4 rev. 011974 PRE, all versions of 10.2, 10.3 to 10.3.3 rev. 011967 PRE, and 10.4 to 10.4.1 rev. 011941 PRE contain a hardcoded user account. Unauthenticated and remote attackers can use this account to access administrative API over HTTP." }, { "lang": "es", "value": "Sitecore Experience Manager (XM) y Experience Platform (XP) versiones 10.1 a 10.1.4 rev. 011974 PRE, todas las versiones 10.2, 10.3 a 10.3.3 rev. 011967 PRE y 10.4 a 10.4.1 rev. 011941 PRE contienen una cuenta de usuario codificada. Atacantes remotos no autenticados pueden usar esta cuenta para acceder a la API administrativa a trav\u00e9s de HTTP." } ], "id": "CVE-2025-34509", "lastModified": "2025-09-08T19:17:06.773", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 4.2, "source": "disclosure@vulncheck.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-06-17T19:15:31.423", "references": [ { "source": "disclosure@vulncheck.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://labs.watchtowr.com/is-b-for-backdoor-pre-auth-rce-chain-in-sitecore-experience-platform/" }, { "source": "disclosure@vulncheck.com", "tags": [ "Vendor Advisory" ], "url": "https://support.sitecore.com/kb?id=kb_article_view\u0026sysparm_article=KB1003667" } ], "sourceIdentifier": "disclosure@vulncheck.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-798" } ], "source": "disclosure@vulncheck.com", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2025-09-03 13:15
Modified
2025-09-08 18:28
Severity ?
Summary
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') vulnerability in Sitecore Sitecore Experience Manager (XM), Sitecore Experience Platform (XP) allows Cache Poisoning.This issue affects Sitecore Experience Manager (XM): from 9.0 through 9.3, from 10.0 through 10.4; Experience Platform (XP): from 9.0 through 9.3, from 10.0 through 10.4.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sitecore | experience_commerce | * | |
sitecore | experience_manager | * | |
sitecore | experience_platform | * | |
sitecore | experience_platform | 10.4 | |
sitecore | managed_cloud | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sitecore:experience_commerce:*:*:*:*:*:*:*:*", "matchCriteriaId": "DCF77DC5-9DF9-4DF7-9636-69CA4BEEDB04", "versionEndIncluding": "10.4", "versionStartIncluding": "9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sitecore:experience_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "17EF29D0-E1DA-4F84-95F4-EA9680EB47DF", "versionEndIncluding": "10.4", "versionStartIncluding": "9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sitecore:experience_platform:*:*:*:*:*:*:*:*", "matchCriteriaId": "88455751-A525-4A59-9DD8-4E015CD1346C", "versionEndExcluding": "10.4", "versionStartIncluding": "9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sitecore:experience_platform:10.4:-:*:*:*:*:*:*", "matchCriteriaId": "78E71AD1-04C7-4D80-9A0A-E386A3FAC860", "vulnerable": true }, { "criteria": "cpe:2.3:a:sitecore:managed_cloud:-:*:*:*:*:*:*:*", "matchCriteriaId": "520CF670-01A2-479F-B637-C413A82463E0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Use of Externally-Controlled Input to Select Classes or Code (\u0027Unsafe Reflection\u0027) vulnerability in Sitecore Sitecore Experience Manager (XM), Sitecore Experience Platform (XP) allows Cache Poisoning.This issue affects Sitecore Experience Manager (XM): from 9.0 through 9.3, from 10.0 through 10.4; Experience Platform (XP): from 9.0 through 9.3, from 10.0 through 10.4." } ], "id": "CVE-2025-53693", "lastModified": "2025-09-08T18:28:13.110", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "9947ef80-c5d5-474a-bbab-97341a59000e", "type": "Secondary" } ] }, "published": "2025-09-03T13:15:49.570", "references": [ { "source": "9947ef80-c5d5-474a-bbab-97341a59000e", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://labs.watchtowr.com/cache-me-if-you-can-sitecore-experience-platform-cache-poisoning-to-rce/" }, { "source": "9947ef80-c5d5-474a-bbab-97341a59000e", "tags": [ "Vendor Advisory" ], "url": "https://support.sitecore.com/kb?id=kb_article_view\u0026sysparm_article=KB1003667" } ], "sourceIdentifier": "9947ef80-c5d5-474a-bbab-97341a59000e", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-470" } ], "source": "9947ef80-c5d5-474a-bbab-97341a59000e", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2025-09-03 13:15
Modified
2025-09-08 18:11
Severity ?
Summary
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Sitecore Sitecore Experience Manager (XM), Sitecore Experience Platform (XP).This issue affects Sitecore Experience Manager (XM): from 9.2 through 10.4; Experience Platform (XP): from 9.2 through 10.4.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sitecore | experience_commerce | * | |
sitecore | experience_manager | * | |
sitecore | experience_platform | * | |
sitecore | experience_platform | 10.4 | |
sitecore | managed_cloud | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sitecore:experience_commerce:*:*:*:*:*:*:*:*", "matchCriteriaId": "F805A7BA-F50B-4F32-9849-645B4F448872", "versionEndIncluding": "10.4", "versionStartIncluding": "9.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:sitecore:experience_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "940C8CE3-7311-479E-8A96-6CD4C4F69E0E", "versionEndIncluding": "10.4", "versionStartIncluding": "9.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:sitecore:experience_platform:*:*:*:*:*:*:*:*", "matchCriteriaId": "411C4275-CC92-45AA-801E-1503F861A3A3", "versionEndExcluding": "10.4", "versionStartIncluding": "9.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:sitecore:experience_platform:10.4:-:*:*:*:*:*:*", "matchCriteriaId": "78E71AD1-04C7-4D80-9A0A-E386A3FAC860", "vulnerable": true }, { "criteria": "cpe:2.3:a:sitecore:managed_cloud:-:*:*:*:*:*:*:*", "matchCriteriaId": "520CF670-01A2-479F-B637-C413A82463E0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Sitecore Sitecore Experience Manager (XM), Sitecore Experience Platform (XP).This issue affects Sitecore Experience Manager (XM): from 9.2 through 10.4; Experience Platform (XP): from 9.2 through 10.4." } ], "id": "CVE-2025-53694", "lastModified": "2025-09-08T18:11:15.357", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "9947ef80-c5d5-474a-bbab-97341a59000e", "type": "Secondary" } ] }, "published": "2025-09-03T13:15:49.790", "references": [ { "source": "9947ef80-c5d5-474a-bbab-97341a59000e", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://labs.watchtowr.com/cache-me-if-you-can-sitecore-experience-platform-cache-poisoning-to-rce/" }, { "source": "9947ef80-c5d5-474a-bbab-97341a59000e", "tags": [ "Vendor Advisory" ], "url": "https://support.sitecore.com/kb?id=kb_article_view\u0026sysparm_article=KB1003734" } ], "sourceIdentifier": "9947ef80-c5d5-474a-bbab-97341a59000e", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "9947ef80-c5d5-474a-bbab-97341a59000e", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-06-06 19:15
Modified
2025-01-08 15:15
Severity ?
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Sitecore Experience Platform (XP) v9.3 was discovered to contain an authenticated remote code execution (RCE) vulnerability via the component /sitecore/shell/Invoke.aspx.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://blog.assetnote.io/2023/05/10/sitecore-round-two/ | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://blog.assetnote.io/2023/05/10/sitecore-round-two/ | Exploit, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sitecore | experience_platform | 9.3 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sitecore:experience_platform:9.3:*:*:*:*:*:*:*", "matchCriteriaId": "94E94971-99B7-459A-A0B6-6FDBC397522D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sitecore Experience Platform (XP) v9.3 was discovered to contain an authenticated remote code execution (RCE) vulnerability via the component /sitecore/shell/Invoke.aspx." } ], "id": "CVE-2023-33652", "lastModified": "2025-01-08T15:15:13.540", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2023-06-06T19:15:12.217", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://blog.assetnote.io/2023/05/10/sitecore-round-two/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://blog.assetnote.io/2023/05/10/sitecore-round-two/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-470" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-470" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2025-09-03 13:15
Modified
2025-09-08 18:30
Severity ?
Summary
Deserialization of Untrusted Data vulnerability in Sitecore Experience Manager (XM), Sitecore Experience Platform (XP) allows Remote Code Execution (RCE).This issue affects Experience Manager (XM): from 9.0 through 9.3, from 10.0 through 10.4; Experience Platform (XP): from 9.0 through 9.3, from 10.0 through 10.4.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sitecore | experience_commerce | * | |
sitecore | experience_manager | * | |
sitecore | experience_platform | * | |
sitecore | experience_platform | 10.4 | |
sitecore | managed_cloud | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sitecore:experience_commerce:*:*:*:*:*:*:*:*", "matchCriteriaId": "DCF77DC5-9DF9-4DF7-9636-69CA4BEEDB04", "versionEndIncluding": "10.4", "versionStartIncluding": "9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sitecore:experience_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "17EF29D0-E1DA-4F84-95F4-EA9680EB47DF", "versionEndIncluding": "10.4", "versionStartIncluding": "9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sitecore:experience_platform:*:*:*:*:*:*:*:*", "matchCriteriaId": "88455751-A525-4A59-9DD8-4E015CD1346C", "versionEndExcluding": "10.4", "versionStartIncluding": "9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sitecore:experience_platform:10.4:-:*:*:*:*:*:*", "matchCriteriaId": "78E71AD1-04C7-4D80-9A0A-E386A3FAC860", "vulnerable": true }, { "criteria": "cpe:2.3:a:sitecore:managed_cloud:-:*:*:*:*:*:*:*", "matchCriteriaId": "520CF670-01A2-479F-B637-C413A82463E0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Deserialization of Untrusted Data vulnerability in Sitecore Experience Manager (XM), Sitecore Experience Platform (XP) allows Remote Code Execution (RCE).This issue affects Experience Manager (XM): from 9.0 through 9.3, from 10.0 through 10.4; Experience Platform (XP): from 9.0 through 9.3, from 10.0 through 10.4." } ], "id": "CVE-2025-53691", "lastModified": "2025-09-08T18:30:40.133", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "9947ef80-c5d5-474a-bbab-97341a59000e", "type": "Secondary" } ] }, "published": "2025-09-03T13:15:49.297", "references": [ { "source": "9947ef80-c5d5-474a-bbab-97341a59000e", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://labs.watchtowr.com/cache-me-if-you-can-sitecore-experience-platform-cache-poisoning-to-rce/" }, { "source": "9947ef80-c5d5-474a-bbab-97341a59000e", "tags": [ "Vendor Advisory" ], "url": "https://support.sitecore.com/kb?id=kb_article_view\u0026sysparm_article=KB1003667" } ], "sourceIdentifier": "9947ef80-c5d5-474a-bbab-97341a59000e", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-502" } ], "source": "9947ef80-c5d5-474a-bbab-97341a59000e", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2023-06-06 19:15
Modified
2025-01-08 17:15
Severity ?
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Summary
An issue in the MVC Device Simulator of Sitecore Experience Platform (XP), Experience Manager (XM), and Experience Commerce (XC) v9.0 Initial Release to v13.0 Initial Release allows attackers to bypass authorization rules.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://blog.assetnote.io/2023/05/10/sitecore-round-two/ | Exploit, Third Party Advisory | |
cve@mitre.org | https://support.sitecore.com/kb?id=kb_article_view&sysparm_article=KB1002925 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://blog.assetnote.io/2023/05/10/sitecore-round-two/ | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.sitecore.com/kb?id=kb_article_view&sysparm_article=KB1002925 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sitecore | experience_commerce | * | |
sitecore | experience_manager | * | |
sitecore | experience_platform | * | |
sitecore | managed_cloud | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sitecore:experience_commerce:*:*:*:*:*:*:*:*", "matchCriteriaId": "5347D215-14FC-47E1-9B79-788DF656158B", "versionEndIncluding": "10.3", "versionStartIncluding": "9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sitecore:experience_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6292DA1-E0C4-4253-9E47-4AB795C1A15C", "versionEndIncluding": "10.3", "versionStartIncluding": "9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sitecore:experience_platform:*:*:*:*:*:*:*:*", "matchCriteriaId": "FED0DB4B-0E65-4419-ACDE-4BE8D4C5AA9A", "versionEndIncluding": "10.3", "versionStartIncluding": "9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sitecore:managed_cloud:-:*:*:*:*:*:*:*", "matchCriteriaId": "520CF670-01A2-479F-B637-C413A82463E0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in the MVC Device Simulator of Sitecore Experience Platform (XP), Experience Manager (XM), and Experience Commerce (XC) v9.0 Initial Release to v13.0 Initial Release allows attackers to bypass authorization rules." } ], "id": "CVE-2023-33651", "lastModified": "2025-01-08T17:15:12.777", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2023-06-06T19:15:12.103", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://blog.assetnote.io/2023/05/10/sitecore-round-two/" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://support.sitecore.com/kb?id=kb_article_view\u0026sysparm_article=KB1002925" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://blog.assetnote.io/2023/05/10/sitecore-round-two/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.sitecore.com/kb?id=kb_article_view\u0026sysparm_article=KB1002925" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-863" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-863" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2025-06-17 19:15
Modified
2025-09-08 19:10
Severity ?
Summary
Sitecore PowerShell Extensions, an add-on to Sitecore Experience Manager (XM) and Experience Platform (XP), through version 7.0 is vulnerable to an unrestricted file upload issue. A remote, authenticated attacker can upload arbitrary files to the server using crafted HTTP requests, resulting in remote code execution.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sitecore | experience_commerce | * | |
sitecore | experience_manager | * | |
sitecore | experience_platform | * | |
sitecore | experience_platform | 10.4 | |
sitecore | managed_cloud | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sitecore:experience_commerce:*:*:*:*:*:*:*:*", "matchCriteriaId": "DCF77DC5-9DF9-4DF7-9636-69CA4BEEDB04", "versionEndIncluding": "10.4", "versionStartIncluding": "9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sitecore:experience_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "17EF29D0-E1DA-4F84-95F4-EA9680EB47DF", "versionEndIncluding": "10.4", "versionStartIncluding": "9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sitecore:experience_platform:*:*:*:*:*:*:*:*", "matchCriteriaId": "88455751-A525-4A59-9DD8-4E015CD1346C", "versionEndExcluding": "10.4", "versionStartIncluding": "9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sitecore:experience_platform:10.4:-:*:*:*:*:*:*", "matchCriteriaId": "78E71AD1-04C7-4D80-9A0A-E386A3FAC860", "vulnerable": true }, { "criteria": "cpe:2.3:a:sitecore:managed_cloud:-:*:*:*:*:*:*:*", "matchCriteriaId": "520CF670-01A2-479F-B637-C413A82463E0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sitecore PowerShell Extensions, an add-on to Sitecore Experience Manager (XM) and Experience Platform (XP), through version 7.0 is vulnerable to an unrestricted file upload issue. A remote, authenticated attacker can upload arbitrary files to the server using crafted HTTP requests, resulting in remote code execution." }, { "lang": "es", "value": "Las extensiones de PowerShell de Sitecore, un complemento para Sitecore Experience Manager (XM) y Experience Platform (XP), hasta la versi\u00f3n 7.0, son vulnerables a un problema de carga de archivos sin restricciones. Un atacante remoto y autenticado puede cargar archivos arbitrarios al servidor mediante solicitudes HTTP manipuladas, lo que provoca la ejecuci\u00f3n remota de c\u00f3digo." } ], "id": "CVE-2025-34511", "lastModified": "2025-09-08T19:10:33.220", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "disclosure@vulncheck.com", "type": "Secondary" } ] }, "published": "2025-06-17T19:15:31.683", "references": [ { "source": "disclosure@vulncheck.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://labs.watchtowr.com/is-b-for-backdoor-pre-auth-rce-chain-in-sitecore-experience-platform/" }, { "source": "disclosure@vulncheck.com", "tags": [ "Vendor Advisory" ], "url": "https://support.sitecore.com/kb?id=kb_article_view\u0026sysparm_article=KB1003667" } ], "sourceIdentifier": "disclosure@vulncheck.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-434" } ], "source": "disclosure@vulncheck.com", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2019-07-17 20:15
Modified
2024-11-21 04:25
Severity ?
Summary
In Sitecore 9.0 rev 171002, Persistent XSS exists in the Media Library and File Manager. An authenticated unprivileged user can modify the uploaded file extension parameter to inject arbitrary JavaScript.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://packetstormsecurity.com/files/153613/Sitecore-9.0-Rev-171002-Cross-Site-Scripting.html | Exploit, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/153613/Sitecore-9.0-Rev-171002-Cross-Site-Scripting.html | Exploit, Third Party Advisory, VDB Entry |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sitecore | experience_platform | 9.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sitecore:experience_platform:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "FF4F0BB4-2B42-41D4-89A0-A244FDA2F6DC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Sitecore 9.0 rev 171002, Persistent XSS exists in the Media Library and File Manager. An authenticated unprivileged user can modify the uploaded file extension parameter to inject arbitrary JavaScript." }, { "lang": "es", "value": "En Sitecore versi\u00f3n 9.0 rev 171002, presenta un problema de tipo XSS persistente en la Biblioteca Multimedia y en el Administrador de Archivos. Un usuario sin privilegios autenticado puede modificar el par\u00e1metro extensi\u00f3n de archivo cargado para inyectar JavaScript arbitrario." } ], "id": "CVE-2019-13493", "lastModified": "2024-11-21T04:25:00.343", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-07-17T20:15:11.477", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/153613/Sitecore-9.0-Rev-171002-Cross-Site-Scripting.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/153613/Sitecore-9.0-Rev-171002-Cross-Site-Scripting.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-05-31 21:29
Modified
2025-04-04 15:38
Severity ?
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
Deserialization of Untrusted Data in the Sitecore.Security.AntiCSRF (aka anti CSRF) module in Sitecore CMS 7.0 to 7.2 and Sitecore XP 7.5 to 8.2 allows an unauthenticated attacker to execute arbitrary code by sending a serialized .NET object in the HTTP POST parameter __CSRFTOKEN.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://dev.sitecore.net/Downloads.aspx | Product, Vendor Advisory | |
cve@mitre.org | https://www.synacktiv.com/blog.html | Third Party Advisory | |
cve@mitre.org | https://www.synacktiv.com/ressources/advisories/Sitecore_CSRF_deserialize_RCE.pdf | Exploit, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://dev.sitecore.net/Downloads.aspx | Product, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.synacktiv.com/blog.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.synacktiv.com/ressources/advisories/Sitecore_CSRF_deserialize_RCE.pdf | Exploit, Patch, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sitecore | cms | * | |
sitecore | experience_platform | * |
{ "cisaActionDue": "2025-04-16", "cisaExploitAdd": "2025-03-26", "cisaRequiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", "cisaVulnerabilityName": "Sitecore CMS and Experience Platform (XP) Deserialization Vulnerability", "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sitecore:cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "9B358977-D881-4B0A-8F4D-6D1B0BAAB665", "versionEndIncluding": "7.2", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sitecore:experience_platform:*:*:*:*:*:*:*:*", "matchCriteriaId": "BC833020-7B0B-4593-B4B5-C073F01CC0C2", "versionEndIncluding": "8.2", "versionStartIncluding": "7.5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Deserialization of Untrusted Data in the Sitecore.Security.AntiCSRF (aka anti CSRF) module in Sitecore CMS 7.0 to 7.2 and Sitecore XP 7.5 to 8.2 allows an unauthenticated attacker to execute arbitrary code by sending a serialized .NET object in the HTTP POST parameter __CSRFTOKEN." }, { "lang": "es", "value": "La deserializaci\u00f3n de datos no seguros en el m\u00f3dulo Sitecore.Security.AntiCSRF (conocido como CSRF) en Sitecore CMS versi\u00f3n 7.0 hasta 7.2 y Sitecore XP veris\u00f3n 7.5 hasta 8.2, permite a un atacante no identificado ejecutar c\u00f3digo arbitrario mediante el env\u00edo un objeto .NET serializado en el par\u00e1metro __CSRFTOKEN como parte del par\u00e1metro POST de HTTP." } ], "id": "CVE-2019-9874", "lastModified": "2025-04-04T15:38:31.630", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2019-05-31T21:29:06.123", "references": [ { "source": "cve@mitre.org", "tags": [ "Product", "Vendor Advisory" ], "url": "https://dev.sitecore.net/Downloads.aspx" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.synacktiv.com/blog.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://www.synacktiv.com/ressources/advisories/Sitecore_CSRF_deserialize_RCE.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Vendor Advisory" ], "url": "https://dev.sitecore.net/Downloads.aspx" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.synacktiv.com/blog.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://www.synacktiv.com/ressources/advisories/Sitecore_CSRF_deserialize_RCE.pdf" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-502" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-502" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2019-06-06 14:29
Modified
2024-11-21 04:20
Severity ?
Summary
Sitecore Experience Platform (XP) prior to 9.1.1 is vulnerable to remote code execution via deserialization, aka TFS # 293863. An authenticated user with necessary permissions is able to remotely execute OS commands by sending a crafted serialized object.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sitecore | experience_platform | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sitecore:experience_platform:*:*:*:*:*:*:*:*", "matchCriteriaId": "E3419B7E-A923-4EED-8B68-F9AD7396D9E3", "versionEndExcluding": "9.1.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sitecore Experience Platform (XP) prior to 9.1.1 is vulnerable to remote code execution via deserialization, aka TFS # 293863. An authenticated user with necessary permissions is able to remotely execute OS commands by sending a crafted serialized object." }, { "lang": "es", "value": "Sitecore Experience Platform (XP) anterior a versi\u00f3n 9.1.1 es vulnerable a la ejecuci\u00f3n de c\u00f3digo remota por medio de la deserializaci\u00f3n, tambi\u00e9n se conoce como TFS # 293863. Un usuario autenticado con los permisos necesarios es capaz de ejecutar remotamente los comandos del sistema operativo enviando un objeto serializado creado." } ], "id": "CVE-2019-11080", "lastModified": "2024-11-21T04:20:29.943", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-06-06T14:29:00.327", "references": [ { "source": "cve@mitre.org", "url": "http://packetstormsecurity.com/files/153274/Sitecore-8.x-Deserialization-Remote-Code-Execution.html" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://dev.sitecore.net/Downloads/Sitecore%20Experience%20Platform/91/Sitecore%20Experience%20Platform%2091%20Update1/Release%20Notes" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/minecrater/exploits/blob/master/Sitecore8xDeserialRCE" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://packetstormsecurity.com/files/153274/Sitecore-8.x-Deserialization-Remote-Code-Execution.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://dev.sitecore.net/Downloads/Sitecore%20Experience%20Platform/91/Sitecore%20Experience%20Platform%2091%20Update1/Release%20Notes" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/minecrater/exploits/blob/master/Sitecore8xDeserialRCE" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-502" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-06-17 23:15
Modified
2024-12-17 17:15
Severity ?
Summary
Multiple Sitecore products allow remote code execution. This affects Experience Manager, Experience Platform, and Experience Commerce through 10.3.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://support.sitecore.com/kb?id=kb_article_view&sysparm_article=KB1002979 | Mitigation, Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.sitecore.com/kb?id=kb_article_view&sysparm_article=KB1002979 | Mitigation, Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sitecore | experience_commerce | * | |
sitecore | experience_manager | * | |
sitecore | experience_platform | * | |
sitecore | managed_cloud | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sitecore:experience_commerce:*:*:*:*:*:*:*:*", "matchCriteriaId": "1E155DDF-A874-41BC-879A-51F3081E522B", "versionEndIncluding": "10.3", "versionStartIncluding": "8.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:sitecore:experience_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "654EF83E-0D73-4476-B410-7979FD05A193", "versionEndIncluding": "10.3", "versionStartIncluding": "8.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:sitecore:experience_platform:*:*:*:*:*:*:*:*", "matchCriteriaId": "86314BB1-3F0A-4286-BA5B-26DB415BF4B2", "versionEndIncluding": "10.3", "versionStartIncluding": "8.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:sitecore:managed_cloud:*:*:*:*:*:*:*:*", "matchCriteriaId": "ED6CF6F0-FB89-452D-B213-E8C5F6F60725", "versionEndIncluding": "10.3", "versionStartIncluding": "8.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple Sitecore products allow remote code execution. This affects Experience Manager, Experience Platform, and Experience Commerce through 10.3." } ], "id": "CVE-2023-35813", "lastModified": "2024-12-17T17:15:08.117", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-06-17T23:15:09.137", "references": [ { "source": "cve@mitre.org", "tags": [ "Mitigation", "Patch", "Vendor Advisory" ], "url": "https://support.sitecore.com/kb?id=kb_article_view\u0026sysparm_article=KB1002979" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Patch", "Vendor Advisory" ], "url": "https://support.sitecore.com/kb?id=kb_article_view\u0026sysparm_article=KB1002979" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2023-03-14 21:15
Modified
2025-02-27 21:15
Severity ?
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Summary
An issue was discovered in Sitecore XP/XM 10.3. As an authenticated Sitecore user, a unrestricted language file upload vulnerability exists the can lead to direct code execution on the content management (CM) server.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/istern/CVE-2023-26262 | Exploit, Mitigation, Third Party Advisory | |
cve@mitre.org | https://www.sitecore.com/trust | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/istern/CVE-2023-26262 | Exploit, Mitigation, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.sitecore.com/trust | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sitecore | experience_manager | * | |
sitecore | experience_platform | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sitecore:experience_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "C596E04D-C177-4134-9E2C-8571014F5801", "versionEndIncluding": "10.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sitecore:experience_platform:*:*:*:*:*:*:*:*", "matchCriteriaId": "2703AEBB-B226-4D36-AAC4-30F08BB4A092", "versionEndExcluding": "10.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Sitecore XP/XM 10.3. As an authenticated Sitecore user, a unrestricted language file upload vulnerability exists the can lead to direct code execution on the content management (CM) server." } ], "id": "CVE-2023-26262", "lastModified": "2025-02-27T21:15:18.663", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2023-03-14T21:15:10.553", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Mitigation", "Third Party Advisory" ], "url": "https://github.com/istern/CVE-2023-26262" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.sitecore.com/trust" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Mitigation", "Third Party Advisory" ], "url": "https://github.com/istern/CVE-2023-26262" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.sitecore.com/trust" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-434" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-434" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2025-06-17 19:15
Modified
2025-09-08 19:22
Severity ?
Summary
Sitecore Experience Manager (XM), Experience Platform (XP), and Experience Commerce (XC) versions 9.0 through 9.3 and 10.0 through 10.4 are affected by a Zip Slip vulnerability. A remote, authenticated attacker can exploit this issue by sending a crafted HTTP request to upload a ZIP archive containing path traversal sequences, allowing arbitrary file writes and leading to code execution.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sitecore | experience_commerce | * | |
sitecore | experience_manager | * | |
sitecore | experience_platform | * | |
sitecore | experience_platform | 10.4 | |
sitecore | managed_cloud | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sitecore:experience_commerce:*:*:*:*:*:*:*:*", "matchCriteriaId": "DCF77DC5-9DF9-4DF7-9636-69CA4BEEDB04", "versionEndIncluding": "10.4", "versionStartIncluding": "9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sitecore:experience_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "17EF29D0-E1DA-4F84-95F4-EA9680EB47DF", "versionEndIncluding": "10.4", "versionStartIncluding": "9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sitecore:experience_platform:*:*:*:*:*:*:*:*", "matchCriteriaId": "88455751-A525-4A59-9DD8-4E015CD1346C", "versionEndExcluding": "10.4", "versionStartIncluding": "9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sitecore:experience_platform:10.4:-:*:*:*:*:*:*", "matchCriteriaId": "78E71AD1-04C7-4D80-9A0A-E386A3FAC860", "vulnerable": true }, { "criteria": "cpe:2.3:a:sitecore:managed_cloud:-:*:*:*:*:*:*:*", "matchCriteriaId": "520CF670-01A2-479F-B637-C413A82463E0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sitecore Experience Manager (XM), Experience Platform (XP), and Experience Commerce (XC) versions 9.0 through 9.3 and 10.0 through 10.4 are affected by a Zip Slip vulnerability. A remote, authenticated attacker can exploit this issue by sending a crafted HTTP request to upload a ZIP archive containing path traversal sequences, allowing arbitrary file writes and leading to code execution." }, { "lang": "es", "value": "Las versiones 9.0 a 9.3 y 10.0 a 10.4 de Sitecore Experience Manager (XM), Experience Platform (XP) y Experience Commerce (XC) se ven afectadas por una vulnerabilidad de Zip Slip. Un atacante remoto autenticado puede explotar este problema enviando una solicitud HTTP manipulada para cargar un archivo ZIP que contenga secuencias de path traversal, lo que permite escrituras arbitrarias en archivos y provoca la ejecuci\u00f3n de c\u00f3digo." } ], "id": "CVE-2025-34510", "lastModified": "2025-09-08T19:22:24.210", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "disclosure@vulncheck.com", "type": "Secondary" } ] }, "published": "2025-06-17T19:15:31.557", "references": [ { "source": "disclosure@vulncheck.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://labs.watchtowr.com/is-b-for-backdoor-pre-auth-rce-chain-in-sitecore-experience-platform/" }, { "source": "disclosure@vulncheck.com", "tags": [ "Vendor Advisory" ], "url": "https://support.sitecore.com/kb?id=kb_article_view\u0026sysparm_article=KB1003667" } ], "sourceIdentifier": "disclosure@vulncheck.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-23" } ], "source": "disclosure@vulncheck.com", "type": "Secondary" } ] }