Cyber Posture

CVE-2025-11165

Critical

Published: 24 February 2026

Published
24 February 2026
Modified
03 March 2026
KEV Added
Patch
CVSS Score 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0007 22.1th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-11165 is a critical-severity SQL Injection (CWE-89) vulnerability in Dotcms Dotcms. Its CVSS base score is 9.9 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 22.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-25 (Reference Monitor) and AC-6 (Least Privilege).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates the sandbox escape vulnerability by requiring timely application of vendor patches and updates for the bypass in dotCMS Velocity scripting engine.

prevent

Prevents exploitation by restricting scripting privileges, required for authenticated users to modify Velocity runtime configuration and bypass SecureUberspectorImpl restrictions.

prevent

Enforces a tamper-resistant reference monitor to mediate access to Java classes and packages in the Velocity Uberspector, directly countering the dynamic bypass of introspector restrictions.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059 Command and Scripting Interpreter Execution
Adversaries may abuse command and script interpreters to execute commands, scripts, or binaries.
Why these techniques?

Sandbox escape in public-facing dotCMS Velocity engine directly enables remote RCE via arbitrary command execution (java.lang.Runtime) after bypassing restrictions.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

A sandbox escape vulnerability exists in dotCMS’s Velocity scripting engine (VTools) that allows authenticated users with scripting privileges to bypass class and package restrictions enforced by SecureUberspectorImpl. By dynamically modifying the Velocity engine’s runtime configuration and reinitializing its Uberspect, a…

more

malicious actor can remove the introspector.restrict.classes and introspector.restrict.packages protections. Once these restrictions are cleared, the attacker can access arbitrary Java classes, including java.lang.Runtime, and execute arbitrary system commands under the privileges of the application process (e.g. dotCMS or Tomcat user).

Deeper analysisAI

CVE-2025-11165 is a sandbox escape vulnerability in dotCMS’s Velocity scripting engine, specifically the VTools component. It enables authenticated users with scripting privileges to bypass class and package restrictions enforced by SecureUberspectorImpl. The issue, published on 2026-02-24, is classified under CWE-89 and carries a CVSS v3.1 base score of 9.9 (AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H), indicating critical severity due to its potential for high-impact remote exploitation.

Attackers require low privileges as an authenticated user with scripting access, exploitable over the network with low complexity and no user interaction. By dynamically modifying the Velocity engine’s runtime configuration and reinitializing its Uberspect, they can clear protections such as introspector.restrict.classes and introspector.restrict.packages. This allows access to arbitrary Java classes, including java.lang.Runtime, culminating in arbitrary system command execution under the privileges of the application process, such as the dotCMS or Tomcat user.

Mitigation details are available in the dotCMS advisory at https://dev.dotcms.com/docs/known-security-issues?issueNumber=SI-74.

Details

CWE(s)

Affected Products

dotcms
dotcms
≤ 24.12.27 · 25.01.07 — 25.07.10

CVEs Like This One

CVE-2025-53595Shared CWE-89
CVE-2025-53475Shared CWE-89
CVE-2024-55460Shared CWE-89
CVE-2026-39815Shared CWE-89
CVE-2025-36588Shared CWE-89
CVE-2024-56804Shared CWE-89
CVE-2025-29893Shared CWE-89
CVE-2026-27497Shared CWE-89
CVE-2026-3180Shared CWE-89
CVE-2025-1872Shared CWE-89

References