CVE-2025-54425
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-30

Last updated on: 2025-09-22

Assigner: GitHub, Inc.

Description
Umbraco is an ASP.NET CMS. In versions 13.0.0 through 13.9.2, 15.0.0 through 15.4.1 and 16.0.0 through 16.1.0, the content delivery API can be restricted from public access where an API key must be provided in a header to authorize the request. It's also possible to configure output caching, such that the delivery API outputs will be cached for a period of time, improving performance. There's an issue when these two things are used together, where caching doesn't vary by the header that contains the API key. As such, it's possible for a user without a valid API key to retrieve a response for a given path and query if it has recently been requested and cached by request with a valid key. This is fixed in versions 13.9.3, 15.4.4 and 16.1.1.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-30
Last Modified
2025-09-22
Generated
2026-05-06
AI Q&A
2025-07-30
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 3 associated CPEs
Vendor Product Version / Range
umbraco umbraco_cms From 13.0.0 (inc) to 13.9.3 (exc)
umbraco umbraco_cms From 15.0.0 (inc) to 15.4.4 (exc)
umbraco umbraco_cms From 16.0.0 (inc) to 16.1.1 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-200 The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability occurs in Umbraco CMS versions 13.0.0 through 13.9.2, 15.0.0 through 15.4.1, and 16.0.0 through 16.1.0. When the content delivery API is restricted by requiring an API key in a header for authorization, and output caching is enabled, the caching mechanism does not differentiate responses based on the API key header. This means that a user without a valid API key can receive cached responses that were originally requested with a valid API key, potentially exposing restricted content.


How can this vulnerability impact me? :

The vulnerability can allow unauthorized users to access cached content from the content delivery API that should be restricted by API key authorization. This can lead to unintended data exposure, where sensitive or restricted content is accessible without proper authentication.


What immediate steps should I take to mitigate this vulnerability?

Upgrade Umbraco to version 13.9.3, 15.4.4, or 16.1.1 or later, where the caching issue with the API key header has been fixed. Until then, consider disabling output caching on the content delivery API to prevent unauthorized access via cached responses.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart