CVE-2025-53693
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-09-03

Last updated on: 2025-09-08

Assigner: Wiz

Description
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') vulnerability in Sitecore Sitecore Experience Manager (XM), Sitecore Experience Platform (XP) allows Cache Poisoning.This issue affects Sitecore Experience Manager (XM): from 9.0 through 9.3, from 10.0 through 10.4; Experience Platform (XP): from 9.0 through 9.3, from 10.0 through 10.4.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-09-03
Last Modified
2025-09-08
Generated
2026-05-07
AI Q&A
2025-09-03
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 5 associated CPEs
Vendor Product Version / Range
sitecore experience_commerce From 9.0 (inc) to 10.4 (inc)
sitecore experience_manager From 9.0 (inc) to 10.4 (inc)
sitecore experience_platform From 9.0 (inc) to 10.4 (exc)
sitecore experience_platform 10.4
sitecore managed_cloud *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-470 The product uses external input with reflection to select which classes or code to use, but it does not sufficiently prevent the input from selecting improper classes or code.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-53693 is a vulnerability in Sitecore Experience Manager (XM) and Experience Platform (XP) that involves unsafe reflection, where externally-controlled input is used to select classes or code. This allows attackers to perform cache poisoning by manipulating how Sitecore dynamically processes requests and initializes components, potentially leading to unauthorized actions. The vulnerability affects versions from 9.0 through 9.3 and 10.0 through 10.4.


How can this vulnerability impact me? :

This vulnerability can lead to cache poisoning, which attackers can exploit to manipulate cached content served by the Sitecore platform. When combined with other vulnerabilities like insecure deserialization (as described in Resource 1), it can enable remote code execution (RCE), allowing attackers to fully compromise the affected Sitecore instance. This can result in unauthorized access, data manipulation, and potentially full system takeover. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection of CVE-2025-53693 involves monitoring for unusual HTTP requests to Sitecore's XamlPageHandlerFactory handler, specifically requests targeting .xaml.xml files such as GET /-/xaml/Sitecore.Shell.Xaml.WebControl. Suspicious parameters in the __PARAMETERS or __SOURCE fields that attempt to invoke methods dynamically via reflection may indicate exploitation attempts. Network IDS/IPS rules can be created to flag such requests. Additionally, inspecting web server logs for unexpected or malformed XAML requests or AJAX event dispatches can help detect exploitation attempts. Specific commands depend on your environment, but for example, using curl to simulate or detect suspicious requests: curl -v 'http://<sitecore-host>/-/xaml/Sitecore.Shell.Xaml.WebControl' -d '__PARAMETERS=...' or using grep on logs: grep '/-/xaml/' /path/to/access.log. Monitoring for cache poisoning indicators or unexpected cache behavior may also help detect this vulnerability. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include applying the official patches released by Sitecore in June-July 2025 that address this vulnerability. Until patches are applied, restrict access to the XamlPageHandlerFactory HTTP handler by implementing network-level controls such as firewall rules or web application firewall (WAF) rules to block or limit access to the /-/xaml/ endpoint. Additionally, monitor and audit HTTP requests to detect and block suspicious payloads attempting to exploit reflection-based method invocation. Disabling or restricting AJAX event handling that uses reflection, if possible, can reduce attack surface. Finally, ensure that your Sitecore Experience Manager (XM) or Experience Platform (XP) instances are updated to versions beyond 10.4 or 9.3 as applicable. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart