Researchers Warn of Sitecore Exploit Chain Linking Cache Poisoning and Remote Code Execution
Sitecore Experience Platform曝出三处新安全漏洞:HTML缓存中毒、远程代码执行及信息泄露。前两处已于六月修复,第三处七月修复。watchTowr Labs先前发现三处类似漏洞,研究者指出可将预认证缓存中毒与后认证远程代码执行结合形成攻击链。 2025-8-29 17:22:0 Author: thehackernews.com(查看原文) 阅读量:16 收藏

Vulnerability / Web Security

Three new security vulnerabilities have been disclosed in the Sitecore Experience Platform that could be exploited to achieve information disclosure and remote code execution.

The flaws, per watchTowr Labs, are listed below -

  • CVE-2025-53693 - HTML cache poisoning through unsafe reflections
  • CVE-2025-53691 - Remote code execution (RCE) through insecure deserialization
  • CVE-2025-53694 - Information Disclosure in ItemService API with a restricted anonymous user, leading to exposure of cache keys using a brute-force approach

Patches for the first two shortcomings were released by Sitecore in June and for the third in July 2025, with the company stating that "successful exploitation of the related vulnerabilities might lead to remote code execution and non-authorized access to information."

Identity Security Risk Assessment

The findings build on three more flaws in the same product that were detailed by watchTowr back in June -

  • CVE-2025-34509 (CVSS score: 8.2) - Use of hard-coded credentials
  • CVE-2025-34510 (CVSS score: 8.8) - Post-authenticated remote code execution via path traversal
  • CVE-2025-34511 (CVSS score: 8.8) - Post-authenticated remote code execution via Sitecore PowerShell Extension

watchTowr Labs researcher Piotr Bazydlo said the newly uncovered bugs could be fashioned into an exploit chain by bringing together the pre-auth HTML cache poisoning vulnerability with a post-authenticated remote code execution issue to compromise a fully-patched Sitecore Experience Platform instance.

The entire sequence of events leading up to code execution is as follows: A threat actor could leverage the ItemService API, if exposed, to trivially enumerate HTML cache keys stored in the Sitecore cache and send HTTP cache poisoning requests to those keys.

This could then be chained with CVE-2025-53691 to supply malicious HTML code that ultimately results in code execution by means of an unrestricted BinaryFormatter call.

"We managed to abuse a very restricted reflection path to call a method that lets us poison any HTML cache key," Bazydlo said. "That single primitive opened the door to hijacking Sitecore Experience Platform pages - and from there, dropping arbitrary JavaScript to trigger a Post-Auth RCE vulnerability."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2025/08/researchers-warn-of-sitecore-exploit.html
如有侵权请联系:admin#unsafe.sh