Cyber Posture

CVE-2025-53693

CriticalPublic PoC

Published: 03 September 2025

Published
03 September 2025
Modified
08 September 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0034 56.9th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-53693 is a critical-severity Unsafe Reflection (CWE-470) vulnerability in Sitecore Experience Platform. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 43.1% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires validation of all externally controlled inputs, directly preventing unsafe reflection by ensuring inputs cannot select arbitrary classes or code leading to cache poisoning.

prevent

Mandates timely identification, reporting, and correction of flaws like CVE-2025-53693 via patches, eliminating the unsafe reflection vulnerability.

prevent

Restricts types and characteristics of inputs to the system, limiting externally controlled data that could be used to influence class or code selection in reflection.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Direct remote unauthenticated exploitation of public-facing Sitecore web app via unsafe reflection leading to RCE.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') vulnerability in Sitecore Sitecore Experience Manager (XM), Sitecore Experience Platform (XP) allows Cache Poisoning.This issue affects Sitecore Experience Manager (XM): from 9.0 through 9.3, from 10.0 through 10.4; Experience…

more

Platform (XP): from 9.0 through 9.3, from 10.0 through 10.4.

Deeper analysisAI

CVE-2025-53693 is a Use of Externally-Controlled Input to Select Classes or Code vulnerability, known as 'Unsafe Reflection' and mapped to CWE-470, present in Sitecore Experience Manager (XM) versions from 9.0 through 9.3 and 10.0 through 10.4, as well as Sitecore Experience Platform (XP) versions from 9.0 through 9.3 and 10.0 through 10.4. This flaw allows for cache poisoning by leveraging externally controlled input to influence class or code selection.

With a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), the vulnerability is exploitable over the network by unauthenticated attackers requiring low complexity and no user interaction. Successful exploitation enables high-impact disruption to confidentiality, integrity, and availability, facilitating cache poisoning that can escalate to remote code execution.

Advisories from Watchtower Labs (https://labs.watchtowr.com/cache-me-if-you-can-sitecore-experience-platform-cache-poisoning-to-rce/) and Sitecore's knowledge base (https://support.sitecore.com/kb?id=kb_article_view&sysparm_article=KB1003667) provide details on mitigation, including patches and configuration guidance for affected Sitecore XM and XP deployments.

Details

CWE(s)

Affected Products

sitecore
experience commerce
9.0 — 10.4
sitecore
experience manager
9.0 — 10.4
sitecore
experience platform
10.4 · 9.0 — 10.4
sitecore
managed cloud
all versions

CVEs Like This One

CVE-2025-53691Same product: Sitecore Experience Commerce
CVE-2025-53690Same product: Sitecore Experience Commerce
CVE-2026-25498Shared CWE-470
CVE-2025-68455Shared CWE-470
CVE-2025-63690Shared CWE-470
CVE-2025-34393Shared CWE-470
CVE-2024-4990Shared CWE-470
CVE-2026-33157Shared CWE-470
CVE-2026-32264Shared CWE-470
CVE-2026-42027Shared CWE-470

References