Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Sitecore CMS Platform Vulnerabilities Enables Remote Code Execution

Posted on September 1, 2025September 1, 2025 By CWS

Important vulnerabilities in Sitecore Expertise Platform enable attackers to attain full system compromise by means of a classy assault chain combining HTML cache poisoning with distant code execution capabilities.

These flaws additionally allow attackers to enumerate cache keys and configuration particulars through the uncovered ItemServices API, streamlining focused exploitation.

Key Takeaways1. CVE-2025-53693 lets attackers inject HTML through AddToCache.2. CVE-2025-53691 abuses BinaryFormatter.Deserialize() for full code execution.3. CVE-2025-53694 exposes cache key particulars, aiding focused assaults.

Sitecore Expertise Platform Vulnerabilities

The safety analysis agency watchTowr Labs has recognized three main vulnerabilities in Sitecore Expertise Platform 10.4.1 that may be chained collectively for a devastating impact. 

The first vulnerability, CVE-2025-53693, allows HTML cache poisoning by means of unsafe reflection mechanisms within the XamlPageHandlerFactory handler.

The assault exploits the AjaxScriptManager.DispatchMethod() perform, which makes use of reflection to dynamically invoke strategies primarily based on user-supplied parameters.

Attackers can goal the weak endpoint at /-/xaml/Sitecore.Shell.Xaml.WebControl with specifically crafted POST requests containing malicious __PARAMETERS and __SOURCE values.

The core exploitation happens by means of the AddToCache(string, string) technique in Sitecore.Net.UI.WebControl, permitting attackers to inject arbitrary HTML into Sitecore’s cache system. A pattern exploit request demonstrates the simplicity of the assault:

The second important vulnerability, CVE-2025-53691, offers the pathway from cache poisoning to full distant code execution by means of insecure deserialization within the BinaryFormatter.Deserialize() technique. 

This vulnerability exists within the Sitecore.Convert.Base64ToObject() perform, which processes base64-encoded objects with out correct validation.

The assault chain leverages the ConvertToRuntimeHtml pipeline, particularly concentrating on iframe parts with embedded serialized payloads. 

When the FixHtmlPage management processes malicious HTML containing iframe tags with id and worth attributes, it triggers the weak deserialization path.

Moreover, CVE-2025-53694 exposes delicate data by means of the ItemServices API, enabling attackers to enumerate cache keys and system configurations. 

This vulnerability permits unauthorized entry to Sitecore merchandise metadata, together with caching settings and gadget configurations, facilitating focused cache poisoning assaults.

CVETitleSeverityCVE-2025-53693HTML Cache PoisoningHighCVE-2025-53691Deserialization Distant Code Exec.CriticalCVE-2025-53694ItemServices Metadata DisclosureHigh

Sitecore has launched patches for these vulnerabilities in June and July 2025.

Organizations utilizing Sitecore Expertise Platform ought to instantly apply the obtainable safety updates and evaluation their ItemServices API publicity to forestall exploitation of those important safety flaws that have an effect on 1000’s of enterprise installations worldwide.

Discover this Story Fascinating! Comply with us on Google Information, LinkedIn, and X to Get Extra On the spot Updates.

Cyber Security News Tags:CMS, Code, Enables, Execution, Platform, Remote, Sitecore, Vulnerabilities

Post navigation

Previous Post: Infostealer Malware is Being Exploited by APT Groups for Targeted Attacks
Next Post: Windows 11 25H2 Update Preview Released, What’s New?

Related Posts

Stealthy WordPress Malware Deliver Windows Trojan via PHP Backdoor Cyber Security News
CISA Releases Four ICS Advisories Surrounding Vulnerabilities, and Exploits Cyber Security News
Vulnerabilities in Preinstalled Android Apps Expose PIN Codes and Allow Command Injection Cyber Security News
Hackers Weaponize PDF Along With a Malicious LNK File to Compromise Windows Systems Cyber Security News
Red Bull-Themed Phishing Attacks Steal Job Seekers Login Credentials Cyber Security News
Chinese Hackers Exploit SAP RCE Vulnerability to Upload Supershell Backdoors Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New Namespace Reuse Vulnerability Allows Remote Code Execution in Microsoft Azure AI, Google Vertex AI, and Hugging Face
  • Tidal Cyber Raises $10 Million for CTI and Adversary Behavior Platform
  • How to Use Biometrics Securely
  • Malicious npm Packages Exploit Ethereum Smart Contracts to Target Crypto Developers
  • CISA Warns of Critical SunPower Device Vulnerability Let Attackers Gain Full Device Access

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New Namespace Reuse Vulnerability Allows Remote Code Execution in Microsoft Azure AI, Google Vertex AI, and Hugging Face
  • Tidal Cyber Raises $10 Million for CTI and Adversary Behavior Platform
  • How to Use Biometrics Securely
  • Malicious npm Packages Exploit Ethereum Smart Contracts to Target Crypto Developers
  • CISA Warns of Critical SunPower Device Vulnerability Let Attackers Gain Full Device Access

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News