Plattform
dotnet
Komponente
sitecore-experience-manager
Behoben in
9.3.1
10.4.1
9.3.1
10.4.1
9.3.1
10.4.1
CVE-2025-34510 represents a Remote Code Execution (RCE) vulnerability impacting Sitecore Experience Manager (XM), Experience Platform (XP), and Experience Commerce (XC). This Zip Slip vulnerability allows authenticated attackers to execute arbitrary code on affected systems by exploiting improper handling of ZIP archive paths during file uploads. The vulnerability affects versions 9.0 through 10.4, and a patch is available to address the issue.
The impact of CVE-2025-34510 is significant due to the potential for Remote Code Execution. A successful exploit allows an attacker, with authenticated access, to upload a crafted ZIP file containing path traversal sequences. This enables them to write arbitrary files to the server, potentially overwriting critical system files or injecting malicious code. The attacker could then execute this code, gaining complete control over the affected Sitecore instance. This could lead to data breaches, system compromise, and denial of service. The blast radius extends to any sensitive data processed or stored within the Sitecore environment, including customer information, content assets, and business-critical data.
CVE-2025-34510 was publicly disclosed on 2025-06-17. The vulnerability's CVSS score of 8.8 (HIGH) indicates a significant risk. As of this writing, no public proof-of-concept (POC) exploits have been released, but the nature of the vulnerability (RCE via file upload) makes it a likely target for exploitation. It is recommended to prioritize patching to prevent potential attacks. The vulnerability is not currently listed on CISA KEV.
Organizations heavily reliant on Sitecore Experience Manager for content management and digital experience delivery are at significant risk. This includes businesses using Sitecore for e-commerce, marketing automation, and customer relationship management. Specifically, deployments utilizing older versions (9.0-10.4) without robust file upload validation are particularly vulnerable. Shared hosting environments where multiple tenants share the same server infrastructure also face increased risk due to the potential for cross-tenant exploitation.
• .NET / Sitecore: Monitor Sitecore logs for unusual file upload activity, particularly attempts to write files outside of designated upload directories. Use PowerShell to check for unexpected files in sensitive locations.
Get-ChildItem -Path "C:\inetpub\wwwroot\sitecore\*" -Recurse -Filter "*.config"• .NET / Sitecore: Examine web server access logs for HTTP POST requests to file upload endpoints with suspicious ZIP archive filenames or content. • .NET / Sitecore: Implement Windows Defender exploit mitigation rules to detect and prevent path traversal attacks. • .NET / Sitecore: Review Sitecore configuration files for any custom file upload handlers that might be vulnerable to path traversal.
disclosure
discovery
patch
Exploit-Status
EPSS
87.27% (99% Perzentil)
CISA SSVC
CVSS-Vektor
The primary mitigation for CVE-2025-34510 is to upgrade to a patched version of Sitecore Experience Manager, XP, or XC. Sitecore has released updates to address this vulnerability. If immediate patching is not feasible, consider implementing temporary workarounds. These might include restricting file upload functionality, validating ZIP archive contents to prevent path traversal, and implementing stricter access controls to limit authenticated user privileges. Web Application Firewalls (WAFs) configured to detect and block malicious file uploads can also provide an additional layer of defense. After upgrading, confirm the fix by attempting to upload a ZIP archive containing a path traversal sequence and verifying that the upload is blocked or fails safely.
Actualice Sitecore Experience Manager a una versión posterior a la 10.4 que haya solucionado la vulnerabilidad Zip Slip. Consulte el artículo de la base de conocimientos de Sitecore (KB1003667) para obtener más detalles e instrucciones específicas de actualización.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2025-34510 is a Remote Code Execution (RCE) vulnerability in Sitecore Experience Manager (XM), XP, and XC versions 9.0–10.4. It allows authenticated attackers to execute arbitrary code via a Zip Slip vulnerability.
If you are using Sitecore Experience Manager, XP, or XC versions 9.0 through 10.4, you are potentially affected by this vulnerability. Assess your environment and upgrade as soon as possible.
The recommended fix is to upgrade to a patched version of Sitecore Experience Manager, XP, or XC. Refer to the official Sitecore advisory for details on available patches.
While active exploitation is not yet confirmed, the vulnerability's severity and ease of exploitation suggest a high probability of exploitation. Monitor security advisories and threat intelligence feeds.
Refer to the official Sitecore security advisory for detailed information and mitigation guidance: [https://www.sitecore.com/security/advisories](https://www.sitecore.com/security/advisories)
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.
Lade deine packages.lock.json-Datei hoch und wir sagen dir sofort, ob du betroffen bist.