CVE-2025-53693
Published: 03 September 2025
Summary
CVE-2025-53693 is a critical-severity Unsafe Reflection (CWE-470) vulnerability in Sitecore Experience Platform. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 43.1% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Requires validation of all externally controlled inputs, directly preventing unsafe reflection by ensuring inputs cannot select arbitrary classes or code leading to cache poisoning.
Mandates timely identification, reporting, and correction of flaws like CVE-2025-53693 via patches, eliminating the unsafe reflection vulnerability.
Restricts types and characteristics of inputs to the system, limiting externally controlled data that could be used to influence class or code selection in reflection.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Direct remote unauthenticated exploitation of public-facing Sitecore web app via unsafe reflection leading to RCE.
NVD Description
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') vulnerability in Sitecore Sitecore Experience Manager (XM), Sitecore Experience Platform (XP) allows Cache Poisoning.This issue affects Sitecore Experience Manager (XM): from 9.0 through 9.3, from 10.0 through 10.4; Experience…
more
Platform (XP): from 9.0 through 9.3, from 10.0 through 10.4.
Deeper analysisAI
CVE-2025-53693 is a Use of Externally-Controlled Input to Select Classes or Code vulnerability, known as 'Unsafe Reflection' and mapped to CWE-470, present in Sitecore Experience Manager (XM) versions from 9.0 through 9.3 and 10.0 through 10.4, as well as Sitecore Experience Platform (XP) versions from 9.0 through 9.3 and 10.0 through 10.4. This flaw allows for cache poisoning by leveraging externally controlled input to influence class or code selection.
With a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), the vulnerability is exploitable over the network by unauthenticated attackers requiring low complexity and no user interaction. Successful exploitation enables high-impact disruption to confidentiality, integrity, and availability, facilitating cache poisoning that can escalate to remote code execution.
Advisories from Watchtower Labs (https://labs.watchtowr.com/cache-me-if-you-can-sitecore-experience-platform-cache-poisoning-to-rce/) and Sitecore's knowledge base (https://support.sitecore.com/kb?id=kb_article_view&sysparm_article=KB1003667) provide details on mitigation, including patches and configuration guidance for affected Sitecore XM and XP deployments.
Details
- CWE(s)