Article Details

Scrape Timestamp (UTC): 2025-08-29 17:28:53.480

Source: https://thehackernews.com/2025/08/researchers-warn-of-sitecore-exploit.html

Original Article Text

Click to Toggle View

Researchers Warn of Sitecore Exploit Chain Linking Cache Poisoning and Remote Code Execution. Three new security vulnerabilities have been disclosed in the Sitecore Experience Platform that could be exploited to achieve information disclosure and remote code execution. The flaws, per watchTowr Labs, are listed below - Patches for the first two shortcomings were released by Sitecore in June and for the third in July 2025, with the company stating that "successful exploitation of the related vulnerabilities might lead to remote code execution and non-authorized access to information." The findings build on three more flaws in the same product that were detailed by watchTowr back in June - watchTowr Labs researcher Piotr Bazydlo said the newly uncovered bugs could be fashioned into an exploit chain by bringing together the pre-auth HTML cache poisoning vulnerability with a post-authenticated remote code execution issue to compromise a fully-patched Sitecore Experience Platform instance. The entire sequence of events leading up to code execution is as follows: A threat actor could leverage the ItemService API, if exposed, to trivially enumerate HTML cache keys stored in the Sitecore cache and send HTTP cache poisoning requests to those keys. This could then be chained with CVE-2025-53691 to supply malicious HTML code that ultimately results in code execution by means of an unrestricted BinaryFormatter call. "We managed to abuse a very restricted reflection path to call a method that lets us poison any HTML cache key," Bazydlo said. "That single primitive opened the door to hijacking Sitecore Experience Platform pages - and from there, dropping arbitrary JavaScript to trigger a Post-Auth RCE vulnerability."

Daily Brief Summary

VULNERABILITIES // Sitecore Platform Vulnerabilities Enable Cache Poisoning and Code Execution

Researchers at watchTowr Labs identified three new vulnerabilities in the Sitecore Experience Platform, potentially allowing remote code execution and unauthorized information access.

Sitecore released patches for two vulnerabilities in June and a third in July 2025, addressing these critical security issues.

The exploit chain involves combining a pre-auth HTML cache poisoning flaw with a post-authenticated remote code execution vulnerability.

Attackers could exploit the ItemService API to enumerate HTML cache keys and send cache poisoning requests, leading to code execution.

The vulnerabilities enable threat actors to inject malicious HTML code, utilizing an unrestricted BinaryFormatter call for execution.

Organizations using Sitecore should apply the latest patches immediately to mitigate potential exploitation risks.

This incident underscores the importance of regular security assessments and timely patch management to protect against evolving threats.