Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Researchers Warn of Sitecore Exploit Chain Linking Cache Poisoning and Remote Code Execution

Researchers Warn of Sitecore Exploit Chain Linking Cache Poisoning and Remote Code Execution

Posted on August 29, 2025August 29, 2025 By CWS

Aug 29, 2025Ravie LakshmananVulnerability / Internet Safety
Three new safety vulnerabilities have been disclosed within the Sitecore Expertise Platform that could possibly be exploited to realize data disclosure and distant code execution.
The failings, per watchTowr Labs, are listed under –

CVE-2025-53693 – HTML cache poisoning by way of unsafe reflections
CVE-2025-53691 – Distant code execution (RCE) by way of insecure deserialization
CVE-2025-53694 – Info Disclosure in ItemService API with a restricted nameless person, resulting in publicity of cache keys utilizing a brute-force method

Patches for the primary two shortcomings have been launched by Sitecore in June and for the third in July 2025, with the corporate stating that “profitable exploitation of the associated vulnerabilities may result in distant code execution and non-authorized entry to data.”

The findings construct on three extra flaws in the identical product that have been detailed by watchTowr again in June –

CVE-2025-34509 (CVSS rating: 8.2) – Use of hard-coded credentials
CVE-2025-34510 (CVSS rating: 8.8) – Put up-authenticated distant code execution by way of path traversal
CVE-2025-34511 (CVSS rating: 8.8) – Put up-authenticated distant code execution by way of Sitecore PowerShell Extension

watchTowr Labs researcher Piotr Bazydlo stated the newly uncovered bugs could possibly be long-established into an exploit chain by bringing collectively the pre-auth HTML cache poisoning vulnerability with a post-authenticated distant code execution challenge to compromise a fully-patched Sitecore Expertise Platform occasion.
The whole sequence of occasions main as much as code execution is as follows: A risk actor might leverage the ItemService API, if uncovered, to trivially enumerate HTML cache keys saved within the Sitecore cache and ship HTTP cache poisoning requests to these keys.
This might then be chained with CVE-2025-53691 to provide malicious HTML code that in the end ends in code execution by the use of an unrestricted BinaryFormatter name.
“We managed to abuse a really restricted reflection path to name a technique that lets us poison any HTML cache key,” Bazydlo stated. “That single primitive opened the door to hijacking Sitecore Expertise Platform pages – and from there, dropping arbitrary JavaScript to set off a Put up-Auth RCE vulnerability.”

The Hacker News Tags:Cache, Chain, Code, Execution, Exploit, Linking, Poisoning, Remote, Researchers, Sitecore, Warn

Post navigation

Previous Post: WhatsApp 0-Day Vulnerability Exploited to Hack Mac and iOS Users
Next Post: How to Understand Ransomware-as-a-Service (RaaS)

Related Posts

GoBruteforcer Botnet Targets Crypto Project Databases by Exploiting Weak Credentials GoBruteforcer Botnet Targets Crypto Project Databases by Exploiting Weak Credentials The Hacker News
Storm-2603 Deploys DNS-Controlled Backdoor in Warlock and LockBit Ransomware Attacks Storm-2603 Deploys DNS-Controlled Backdoor in Warlock and LockBit Ransomware Attacks The Hacker News
Qilin Ransomware Ranked Highest in April 2025 with Over 45 Data Leak Disclosures Qilin Ransomware Ranked Highest in April 2025 with Over 45 Data Leak Disclosures The Hacker News
5 BCDR Essentials for Effective Ransomware Defense 5 BCDR Essentials for Effective Ransomware Defense The Hacker News
You Didn’t Get Phished — You Onboarded the Attacker You Didn’t Get Phished — You Onboarded the Attacker The Hacker News
Critical WordPress Modular DS Plugin Flaw Actively Exploited to Gain Admin Access Critical WordPress Modular DS Plugin Flaw Actively Exploited to Gain Admin Access The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News