Xperience

8 CVEs product

Monthly

CVE-2025-5591 MEDIUM This Month

Kentico Xperience 13 is vulnerable to a stored cross-site scripting attack via a form component, allowing an attacker to hijack a victim user’s session and perform actions in their security context. [CVSS 5.4 MEDIUM]

XSS Xperience
NVD
CVSS 3.1
5.4
EPSS
0.0%
CVE-2025-32370 HIGH POC This Month

Kentico Xperience before 13.0.178 has a specific set of allowed ContentUploader file extensions for unauthenticated uploads; however, because .zip is processed through TryZipProviderSafe, there is. Rated high severity (CVSS 7.2), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.

XSS Xperience
NVD Exploit-DB
CVSS 3.1
7.2
EPSS
0.3%
CVE-2025-32369 MEDIUM POC This Month

Kentico Xperience before 13.0.181 allows authenticated users to distribute malicious content (for stored XSS) via certain interactions with the media library file upload feature. Rated medium severity (CVSS 6.4), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.

XSS File Upload Xperience
NVD
CVSS 3.1
6.4
EPSS
0.1%
CVE-2025-2794 HIGH This Week

An unsafe reflection vulnerability in Kentico Xperience allows an unauthenticated attacker to kill the current process, leading to a Denial-of-Service condition.0.180. Rated high severity (CVSS 8.7), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.

Information Disclosure Xperience
NVD
CVSS 4.0
8.7
EPSS
1.1%
CVE-2025-2749 HIGH POC PATCH This Month

An authenticated remote code execution in Kentico Xperience allows authenticated users Staging Sync Server to upload arbitrary data to path relative locations. Rated high severity (CVSS 7.2), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available.

RCE Path Traversal File Upload Xperience
NVD
CVSS 3.1
7.2
EPSS
1.2%
CVE-2025-2748 MEDIUM PATCH This Month

The Kentico Xperience application does not fully validate or filter files uploaded via the multiple-file upload functionality, which allows for stored XSS.0.178. Rated medium severity (CVSS 6.1), this vulnerability is remotely exploitable, no authentication required, low attack complexity. This Cross-Site Scripting (XSS) vulnerability could allow attackers to inject malicious scripts into web pages viewed by other users.

XSS File Upload Xperience
NVD
CVSS 3.1
6.1
EPSS
0.2%
CVE-2025-2747 CRITICAL POC KEV PATCH THREAT Act Now

Kentico Xperience contains a second authentication bypass in the Staging Sync Server through None-type password handling, allowing administrative control. Companion to CVE-2025-2746.

Authentication Bypass Xperience
NVD GitHub
CVSS 3.1
9.8
EPSS
89.4%
CVE-2025-2746 CRITICAL POC KEV PATCH THREAT Act Now

Kentico Xperience through 13.0.172 contains an authentication bypass in the Staging Sync Server through empty SHA1 username handling in digest authentication, allowing administrative object control.

Authentication Bypass Xperience
NVD GitHub
CVSS 3.1
9.8
EPSS
84.3%
CVE-2025-5591
EPSS 0% CVSS 5.4
MEDIUM This Month

Kentico Xperience 13 is vulnerable to a stored cross-site scripting attack via a form component, allowing an attacker to hijack a victim user’s session and perform actions in their security context. [CVSS 5.4 MEDIUM]

XSS Xperience
NVD
CVE-2025-32370
EPSS 0% CVSS 7.2
HIGH POC This Month

Kentico Xperience before 13.0.178 has a specific set of allowed ContentUploader file extensions for unauthenticated uploads; however, because .zip is processed through TryZipProviderSafe, there is. Rated high severity (CVSS 7.2), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.

XSS Xperience
NVD Exploit-DB
CVE-2025-32369
EPSS 0% CVSS 6.4
MEDIUM POC This Month

Kentico Xperience before 13.0.181 allows authenticated users to distribute malicious content (for stored XSS) via certain interactions with the media library file upload feature. Rated medium severity (CVSS 6.4), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.

XSS File Upload Xperience
NVD
CVE-2025-2794
EPSS 1% CVSS 8.7
HIGH This Week

An unsafe reflection vulnerability in Kentico Xperience allows an unauthenticated attacker to kill the current process, leading to a Denial-of-Service condition.0.180. Rated high severity (CVSS 8.7), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.

Information Disclosure Xperience
NVD
CVE-2025-2749
EPSS 1% CVSS 7.2
HIGH POC PATCH This Month

An authenticated remote code execution in Kentico Xperience allows authenticated users Staging Sync Server to upload arbitrary data to path relative locations. Rated high severity (CVSS 7.2), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available.

RCE Path Traversal File Upload +1
NVD
CVE-2025-2748
EPSS 0% CVSS 6.1
MEDIUM PATCH This Month

The Kentico Xperience application does not fully validate or filter files uploaded via the multiple-file upload functionality, which allows for stored XSS.0.178. Rated medium severity (CVSS 6.1), this vulnerability is remotely exploitable, no authentication required, low attack complexity. This Cross-Site Scripting (XSS) vulnerability could allow attackers to inject malicious scripts into web pages viewed by other users.

XSS File Upload Xperience
NVD
CVE-2025-2747
EPSS 89% CVSS 9.8
CRITICAL POC KEV PATCH THREAT Act Now

Kentico Xperience contains a second authentication bypass in the Staging Sync Server through None-type password handling, allowing administrative control. Companion to CVE-2025-2746.

Authentication Bypass Xperience
NVD GitHub
CVE-2025-2746
EPSS 84% CVSS 9.8
CRITICAL POC KEV PATCH THREAT Act Now

Kentico Xperience through 13.0.172 contains an authentication bypass in the Staging Sync Server through empty SHA1 username handling in digest authentication, allowing administrative object control.

Authentication Bypass Xperience
NVD GitHub

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy