Umbraco Cms

11 CVEs product

Monthly

CVE-2026-31834 HIGH PATCH This Week

Privilege escalation in Umbraco CMS versions 15.3.1 through 16.5.0 and 17.x before 17.2.2 allows authenticated backoffice users with user management permissions to assign themselves elevated privileges by bypassing authorization checks on role assignments. An attacker with these permissions could gain administrative access to the CMS without proper privilege validation. No patch is currently available for affected installations.

Privilege Escalation Umbraco Cms
NVD GitHub VulDB
CVSS 3.1
7.2
EPSS
0.0%
CVE-2026-31833 MEDIUM PATCH This Month

Umbraco is an ASP.NET CMS. From 16.2.0 to versions up to 16.5.1 is affected by cross-site scripting (xss) (CVSS 6.7).

XSS Umbraco Cms
NVD GitHub VulDB
CVSS 3.1
6.7
EPSS
0.0%
CVE-2026-31832 MEDIUM PATCH This Month

Umbraco CMS versions 14.0.0 through 16.5.0 and 17.0.0-17.2.1 contain an authorization bypass in a backoffice API endpoint that allows authenticated editors to assign domain configurations to content nodes they lack permission to access. An attacker with valid credentials could exploit this to modify domain settings on restricted content, potentially affecting content visibility or routing. The vulnerability affects Umbraco deployments without patches 16.5.1 or 17.2.2 applied.

Authentication Bypass Umbraco Cms
NVD GitHub VulDB
CVSS 3.1
5.4
EPSS
0.0%
CVE-2021-47776 MEDIUM POC This Month

Umbraco CMS v8.14.1 contains a server-side request forgery vulnerability that allows attackers to manipulate baseUrl parameters in multiple dashboard and help controller endpoints. [CVSS 5.3 MEDIUM]

SSRF Umbraco Cms
NVD Exploit-DB
CVSS 3.1
5.3
EPSS
0.0%
CVE-2025-49147 MEDIUM PATCH This Month

A remote code execution vulnerability in versions 10.0.0 (CVSS 5.3). Remediation should follow standard vulnerability management procedures. Vendor patch is available.

Information Disclosure Umbraco Cms
NVD GitHub
CVSS 3.1
5.3
EPSS
0.1%
CVE-2025-48953 MEDIUM PATCH This Month

Umbraco is an ASP.NET content management system (CMS). Starting in version 14.0.0 and prior to versions 15.4.2 and 16.0.0, it's possible to upload a file that doesn't adhere with the configured allowable file extensions via a manipulated API request. The issue is patched in versions 15.4.2 and 16.0.0. No known workarounds are available.

File Upload Umbraco Cms
NVD GitHub
CVSS 3.1
5.5
EPSS
0.1%
CVE-2025-46736 MEDIUM PATCH This Month

Umbraco is a free and open source .NET content management system. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity.

Information Disclosure Umbraco Cms
NVD GitHub
CVSS 3.1
5.3
EPSS
0.3%
CVE-2025-32017 HIGH PATCH This Week

Umbraco is a free and open source .NET content management system. Rated high severity (CVSS 8.8), this vulnerability is remotely exploitable, low attack complexity.

Path Traversal Umbraco Cms
NVD GitHub
CVSS 3.1
8.8
EPSS
0.4%
CVE-2024-55488 MEDIUM POC This Week

A stored cross-site scripting (XSS) vulnerability in Umbraco CMS v14.3.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.

XSS Umbraco Cms
NVD
CVSS 3.1
6.5
EPSS
0.3%
CVE-2025-24012 MEDIUM PATCH Monitor

Umbraco is a free and open source .NET content management system. Rated medium severity (CVSS 4.6), this vulnerability is remotely exploitable, low attack complexity. This Cross-Site Scripting (XSS) vulnerability could allow attackers to inject malicious scripts into web pages viewed by other users.

XSS Umbraco Cms
NVD GitHub
CVSS 3.1
4.6
EPSS
0.9%
CVE-2025-24011 MEDIUM PATCH This Month

Umbraco is a free and open source .NET content management system. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Epss exploitation probability 31.2%.

Information Disclosure Umbraco Cms
NVD GitHub
CVSS 3.1
5.3
EPSS
31.2%
CVE-2026-31834
EPSS 0% CVSS 7.2
HIGH PATCH This Week

Privilege escalation in Umbraco CMS versions 15.3.1 through 16.5.0 and 17.x before 17.2.2 allows authenticated backoffice users with user management permissions to assign themselves elevated privileges by bypassing authorization checks on role assignments. An attacker with these permissions could gain administrative access to the CMS without proper privilege validation. No patch is currently available for affected installations.

Privilege Escalation Umbraco Cms
NVD GitHub VulDB
CVE-2026-31833
EPSS 0% CVSS 6.7
MEDIUM PATCH This Month

Umbraco is an ASP.NET CMS. From 16.2.0 to versions up to 16.5.1 is affected by cross-site scripting (xss) (CVSS 6.7).

XSS Umbraco Cms
NVD GitHub VulDB
CVE-2026-31832
EPSS 0% CVSS 5.4
MEDIUM PATCH This Month

Umbraco CMS versions 14.0.0 through 16.5.0 and 17.0.0-17.2.1 contain an authorization bypass in a backoffice API endpoint that allows authenticated editors to assign domain configurations to content nodes they lack permission to access. An attacker with valid credentials could exploit this to modify domain settings on restricted content, potentially affecting content visibility or routing. The vulnerability affects Umbraco deployments without patches 16.5.1 or 17.2.2 applied.

Authentication Bypass Umbraco Cms
NVD GitHub VulDB
CVE-2021-47776
EPSS 0% CVSS 5.3
MEDIUM POC This Month

Umbraco CMS v8.14.1 contains a server-side request forgery vulnerability that allows attackers to manipulate baseUrl parameters in multiple dashboard and help controller endpoints. [CVSS 5.3 MEDIUM]

SSRF Umbraco Cms
NVD Exploit-DB
CVE-2025-49147
EPSS 0% CVSS 5.3
MEDIUM PATCH This Month

A remote code execution vulnerability in versions 10.0.0 (CVSS 5.3). Remediation should follow standard vulnerability management procedures. Vendor patch is available.

Information Disclosure Umbraco Cms
NVD GitHub
CVE-2025-48953
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

Umbraco is an ASP.NET content management system (CMS). Starting in version 14.0.0 and prior to versions 15.4.2 and 16.0.0, it's possible to upload a file that doesn't adhere with the configured allowable file extensions via a manipulated API request. The issue is patched in versions 15.4.2 and 16.0.0. No known workarounds are available.

File Upload Umbraco Cms
NVD GitHub
CVE-2025-46736
EPSS 0% CVSS 5.3
MEDIUM PATCH This Month

Umbraco is a free and open source .NET content management system. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity.

Information Disclosure Umbraco Cms
NVD GitHub
CVE-2025-32017
EPSS 0% CVSS 8.8
HIGH PATCH This Week

Umbraco is a free and open source .NET content management system. Rated high severity (CVSS 8.8), this vulnerability is remotely exploitable, low attack complexity.

Path Traversal Umbraco Cms
NVD GitHub
CVE-2024-55488
EPSS 0% CVSS 6.5
MEDIUM POC This Week

A stored cross-site scripting (XSS) vulnerability in Umbraco CMS v14.3.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload. Rated medium severity (CVSS 6.5), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.

XSS Umbraco Cms
NVD
CVE-2025-24012
EPSS 1% CVSS 4.6
MEDIUM PATCH Monitor

Umbraco is a free and open source .NET content management system. Rated medium severity (CVSS 4.6), this vulnerability is remotely exploitable, low attack complexity. This Cross-Site Scripting (XSS) vulnerability could allow attackers to inject malicious scripts into web pages viewed by other users.

XSS Umbraco Cms
NVD GitHub
CVE-2025-24011
EPSS 31% CVSS 5.3
MEDIUM PATCH This Month

Umbraco is a free and open source .NET content management system. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Epss exploitation probability 31.2%.

Information Disclosure Umbraco Cms
NVD GitHub

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy