Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Sitecore CMS Platform Vulnerabilities Enables Remote Code Execution

Posted on September 1, 2025September 1, 2025 By CWS

Important vulnerabilities in Sitecore Expertise Platform enable attackers to attain full system compromise by means of a classy assault chain combining HTML cache poisoning with distant code execution capabilities.

These flaws additionally allow attackers to enumerate cache keys and configuration particulars through the uncovered ItemServices API, streamlining focused exploitation.

Key Takeaways1. CVE-2025-53693 lets attackers inject HTML through AddToCache.2. CVE-2025-53691 abuses BinaryFormatter.Deserialize() for full code execution.3. CVE-2025-53694 exposes cache key particulars, aiding focused assaults.

Sitecore Expertise Platform Vulnerabilities

The safety analysis agency watchTowr Labs has recognized three main vulnerabilities in Sitecore Expertise Platform 10.4.1 that may be chained collectively for a devastating impact. 

The first vulnerability, CVE-2025-53693, allows HTML cache poisoning by means of unsafe reflection mechanisms within the XamlPageHandlerFactory handler.

The assault exploits the AjaxScriptManager.DispatchMethod() perform, which makes use of reflection to dynamically invoke strategies primarily based on user-supplied parameters.

Attackers can goal the weak endpoint at /-/xaml/Sitecore.Shell.Xaml.WebControl with specifically crafted POST requests containing malicious __PARAMETERS and __SOURCE values.

The core exploitation happens by means of the AddToCache(string, string) technique in Sitecore.Net.UI.WebControl, permitting attackers to inject arbitrary HTML into Sitecore’s cache system. A pattern exploit request demonstrates the simplicity of the assault:

The second important vulnerability, CVE-2025-53691, offers the pathway from cache poisoning to full distant code execution by means of insecure deserialization within the BinaryFormatter.Deserialize() technique. 

This vulnerability exists within the Sitecore.Convert.Base64ToObject() perform, which processes base64-encoded objects with out correct validation.

The assault chain leverages the ConvertToRuntimeHtml pipeline, particularly concentrating on iframe parts with embedded serialized payloads. 

When the FixHtmlPage management processes malicious HTML containing iframe tags with id and worth attributes, it triggers the weak deserialization path.

Moreover, CVE-2025-53694 exposes delicate data by means of the ItemServices API, enabling attackers to enumerate cache keys and system configurations. 

This vulnerability permits unauthorized entry to Sitecore merchandise metadata, together with caching settings and gadget configurations, facilitating focused cache poisoning assaults.

CVETitleSeverityCVE-2025-53693HTML Cache PoisoningHighCVE-2025-53691Deserialization Distant Code Exec.CriticalCVE-2025-53694ItemServices Metadata DisclosureHigh

Sitecore has launched patches for these vulnerabilities in June and July 2025.

Organizations utilizing Sitecore Expertise Platform ought to instantly apply the obtainable safety updates and evaluation their ItemServices API publicity to forestall exploitation of those important safety flaws that have an effect on 1000’s of enterprise installations worldwide.

Discover this Story Fascinating! Comply with us on Google Information, LinkedIn, and X to Get Extra On the spot Updates.

Cyber Security News Tags:CMS, Code, Enables, Execution, Platform, Remote, Sitecore, Vulnerabilities

Post navigation

Previous Post: Infostealer Malware is Being Exploited by APT Groups for Targeted Attacks
Next Post: Windows 11 25H2 Update Preview Released, What’s New?

Related Posts

U.S. Government Seizes Online Marketplaces Used to Sell Fraudulent Identity Documents to Cybercriminals Cyber Security News
Tesla’s Telematics Control Unit Vulnerability Let Attackers Gain Code Execution as Root Cyber Security News
Greedy Sponge Hackers Attacking Financial Institutions With Modified Version of AllaKore RAT Cyber Security News
Hackers Upgraded ClickFix Attack With Cache Smuggling to Secretly Download Malicious Files Cyber Security News
Spring Framework Security Flaws Enable Authorization Bypass and Annotation Detection Issues Cyber Security News
Microsoft Probes Leak in Early Alert System as Chinese Hackers Exploit SharePoint Vulnerabilities Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • American Airlines Subsidiary Envoy Compromised in Oracle Hacking Campaign
  • New Phishing Attack Leverages Azure Blob Storage to Impersonate Microsoft
  • New .NET CAPI Backdoor Targets Russian Auto and E-Commerce Firms via Phishing ZIPs
  • PoC Exploit for 7-Zip Vulnerabilities that Allows Remote Code Execution
  • Silver Fox Expands Winos 4.0 Attacks to Japan and Malaysia via HoldingHands RAT

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • American Airlines Subsidiary Envoy Compromised in Oracle Hacking Campaign
  • New Phishing Attack Leverages Azure Blob Storage to Impersonate Microsoft
  • New .NET CAPI Backdoor Targets Russian Auto and E-Commerce Firms via Phishing ZIPs
  • PoC Exploit for 7-Zip Vulnerabilities that Allows Remote Code Execution
  • Silver Fox Expands Winos 4.0 Attacks to Japan and Malaysia via HoldingHands RAT

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News