CVE-2025-53690
Published: 03 September 2025
Summary
CVE-2025-53690 is a critical-severity Deserialization of Untrusted Data (CWE-502) vulnerability in Sitecore Experience Commerce. Its CVSS base score is 9.0 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 8.6% of CVEs by exploit likelihood; CISA has added it to the Known Exploited Vulnerabilities catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Timely patching of the deserialization flaw as per Sitecore KB1003865 and CISA KEV directly eliminates the vulnerability enabling code injection.
Validates untrusted data inputs prior to deserialization to block malicious payloads that lead to remote code execution.
Implements memory protections such as DEP and ASLR to mitigate unauthorized code execution resulting from successful deserialization exploits.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Deserialization vulnerability enables unauthenticated RCE on public-facing Sitecore via crafted ViewState (T1190), with embedded payloads (T1027.009), reconnaissance (T1082, T1083, T1016, T1057), HTML smuggling and exfiltration over C2 (T1027.006, T1041), and local data staging (T1074.001) as observed in exploitation.
NVD Description
Deserialization of Untrusted Data vulnerability in Sitecore Experience Manager (XM), Sitecore Experience Platform (XP) allows Code Injection.This issue affects Experience Manager (XM): through 9.0; Experience Platform (XP): through 9.0.
Deeper analysisAI
CVE-2025-53690 is a Deserialization of Untrusted Data vulnerability (CWE-502) affecting Sitecore Experience Manager (XM) through version 9.0 and Sitecore Experience Platform (XP) through version 9.0. Published on 2025-09-03, it enables code injection and carries a CVSS v3.1 base score of 9.0 (AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H), indicating critical severity due to its potential for high-impact network-based attacks with scope change.
The vulnerability can be exploited by unauthenticated attackers (PR:N) over the network (AV:N) without requiring user interaction (UI:N), though it demands high attack complexity (AC:H). Successful exploitation allows attackers to achieve high levels of confidentiality, integrity, and availability impact (C:H/I:H/A:H) in a changed scope (S:C), typically resulting in remote code execution through injected code.
Advisories provide mitigation details, including Sitecore's knowledge base article KB1003865, a Google Cloud threat intelligence blog detailing the ViewState deserialization zero-day vulnerability, and CISA's Known Exploited Vulnerabilities catalog entry for CVE-2025-53690.
The CISA KEV listing confirms real-world exploitation, urging immediate patching by federal agencies and critical infrastructure operators.
Details
- CWE(s)
- KEV Date Added
- 04 September 2025