Cyber Posture

CVE-2025-2747

CriticalCISA KEVActive ExploitationPublic PoC

Published: 24 March 2025

Published
24 March 2025
Modified
06 November 2025
KEV Added
20 October 2025
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.9126 99.7th percentile
Risk Priority 94 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-2747 is a critical-severity Authentication Bypass Using an Alternate Path or Channel (CWE-288) vulnerability in Kentico Xperience. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 0.3% of CVEs by exploit likelihood; CISA has added it to the Known Exploited Vulnerabilities catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SC-7 (Boundary Protection).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Mandates timely remediation of flaws, such as applying Kentico hotfixes for this exploited authentication bypass in the Staging Sync Server component listed in CISA KEV.

preventdetect

Monitors and controls communications at external boundaries to block remote unauthenticated attackers from reaching and exploiting the vulnerable Staging Sync Server over the network.

prevent

Enforces approved authorizations to prevent unauthorized control of administrative objects despite the authentication bypass in password handling for None type servers.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability is an authentication bypass in the publicly accessible Kentico Xperience Staging Sync Server API, enabling exploitation of a public-facing web application to gain unauthorized administrative control.

NVD Description

An authentication bypass vulnerability in Kentico Xperience allows authentication bypass via the Staging Sync Server component password handling for the server defined None type. Authentication bypass allows an attacker to control administrative objects.This issue affects Xperience through 13.0.178.

Deeper analysisAI

CVE-2025-2747 is an authentication bypass vulnerability in Kentico Xperience, specifically within the Staging Sync Server component's password handling for servers defined with the None type. This flaw allows attackers to bypass authentication and gain control over administrative objects. It affects Kentico Xperience versions through 13.0.178 and carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), mapped to CWE-288.

A remote, unauthenticated attacker can exploit this vulnerability over the network with low complexity and no user interaction. Exploitation enables full bypass of authentication mechanisms, providing the attacker with unauthorized control over administrative objects in the affected system.

Kentico offers hotfixes for this issue via their devnet download portal. Detailed advisories from WatchTowr Labs, VulnCheck, and others outline the vulnerability and recommended mitigations, including patching. The flaw is listed in the CISA Known Exploited Vulnerabilities Catalog.

This vulnerability has seen real-world exploitation, as evidenced by its inclusion in the CISA KEV catalog.

Details

CWE(s)
KEV Date Added
20 October 2025

Affected Products

kentico
xperience
≤ 13.0.178

CVEs Like This One

CVE-2025-2746Same product: Kentico Xperienceboth on KEV
CVE-2025-2749Same product: Kentico Xperienceboth on KEV
CVE-2025-24472Shared CWE-288both on KEV
CVE-2024-55591Shared CWE-288both on KEV
CVE-2026-24858Shared CWE-288both on KEV
CVE-2026-23760Shared CWE-288both on KEV
CVE-2026-25471Shared CWE-288
CVE-2026-40630Shared CWE-288
CVE-2025-67039Shared CWE-288
CVE-2025-13539Shared CWE-288

References