CISA Urges Immediate Patching of Critical Sitecore Vulnerability Under Active Attack

September 5, 2025
Vulnerability / Threat Intelligence

Federal Civilian Executive Branch (FCEB) agencies are directed to update their Sitecore systems by September 25, 2025, due to a critical security vulnerability, identified as CVE-2025-53690, that is currently being exploited. The vulnerability has a CVSS score of 9.0 out of 10, highlighting its severity. According to the U.S. Cybersecurity and Infrastructure Security Agency (CISA), this flaw affects Sitecore Experience Manager (XM), Experience Platform (XP), Experience Commerce (XC), and Managed Cloud, allowing for deserialization of untrusted data through default machine keys. This presents an opportunity for attackers to execute remote code by exploiting exposed ASP.NET machine keys. Mandiant, a Google-owned cybersecurity firm, reported that the ongoing ViewState deserialization attacks utilized a sample machine key found in Sitecore deployment guides from 2017 and earlier. The threat intelligence team…

CISA Urges Immediate Updates to Sitecore Systems Due to Critical Vulnerability Under Active Attack

September 5, 2025

Recent developments in cybersecurity have prompted the Cybersecurity and Infrastructure Security Agency (CISA) to issue a warning to Federal Civilian Executive Branch (FCEB) agencies regarding a critical vulnerability in Sitecore software, specifically affecting Sitecore Experience Manager (XM), Experience Platform (XP), Experience Commerce (XC), and Managed Cloud. Organizations are advised to ensure their Sitecore installations are updated by September 25, 2025, to mitigate potential risks.

The vulnerability, identified as CVE-2025-53690, has been assigned a CVSS score of 9.0, indicating its critical nature. The flaw revolves around the deserialization of untrusted data that involves default machine keys, a security oversight that could potentially allow attackers to perform remote code execution through the exploitation of exposed ASP.NET machine keys.

The issue was brought to light by Mandiant, a cybersecurity firm under Google’s banner, which reported that the vulnerability was actively being exploited. Mandiant’s findings revealed that attackers exploited a sample machine key that was disclosed in Sitecore deployment guides dating back to 2017 and earlier, indicating the persistent risk of using default configurations. This exposure highlights the importance of regularly reviewing and updating security practices to safeguard against evolving threats.

The attack mechanism referenced by Mandiant aligns with tactics outlined in the MITRE ATT&CK framework, particularly those related to initial access and remote execution. Attackers often leverage such vulnerabilities to gain initial access to systems, allowing them to establish persistence within the infrastructure. The use of default configurations, as seen in this instance, can facilitate privilege escalation for malicious actors, amplifying the potential impact of an exploit.

As organizations implement updates in response to this critical advisory, it is imperative for business owners and IT managers to review their current cybersecurity posture. This includes not only applying the necessary patches but also reassessing system configurations and practices. The ease with which default machine keys can be exploited underlines the need for rigorous security hygiene to prevent similar vulnerabilities from being exploited in the future.

In conclusion, the urgency of this update cannot be overstated. Organizations utilizing Sitecore products must act swiftly to protect their environments from potential breaches. Understanding the implications of the CVE-2025-53690 vulnerability is essential, as the persistent threat landscape continues to evolve and challenge conventional defense mechanisms. Acting proactively will be key to maintaining security in a climate increasingly characterized by advanced cyber threats.

Source link