PT-2025-35830 · Sitecore · Sitecore Experience Manager +1
Andi Slok
+4
·
Published
2025-09-03
·
Updated
2025-09-05
·
CVE-2025-53690
9.0
Critical
Base vector | Vector | AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H |
**Name of the Vulnerable Software and Affected Versions:**
Sitecore Experience Manager (XM) versions through 9.0
Sitecore Experience Platform (XP) versions through 9.0
Sitecore versions prior to 9.0 (AD 1.4 and earlier)
**Description:**
A critical deserialization vulnerability exists in Sitecore products, allowing for remote code execution (RCE). This flaw stems from the use of exposed ASP.NET machine keys found in older Sitecore deployment documentation dating back to 2017. Attackers can exploit this vulnerability by injecting malicious ViewState payloads against the `/sitecore/blocked.aspx` endpoint, leading to the execution of arbitrary code.
Observed attacker behavior includes the deployment of WEEPSTEEL reconnaissance malware, privilege escalation to SYSTEM level access, and the use of tools like EARTHWORM for tunneling and SHARPHOUND for Active Directory reconnaissance. The vulnerability has been actively exploited in the wild, with attackers leveraging compromised systems for reconnaissance, data exfiltration, and further network penetration.
**Recommendations:**
Sitecore Experience Manager (XM) versions through 9.0: Rotate machine keys automatically, enable ViewState MAC validation, and encrypt secrets in web.config.
Sitecore Experience Platform (XP) versions through 9.0: Rotate machine keys automatically, enable ViewState MAC validation, and encrypt secrets in web.config.
Sitecore versions prior to 9.0 (AD 1.4 and earlier): Rotate machine keys automatically, enable ViewState MAC validation, and encrypt secrets in web.config.
As a temporary workaround, consider restricting access to the `/sitecore/blocked.aspx` endpoint.
Exploit
Fix
RCE
LPE
Deserialization of Untrusted Data
Weakness Enumeration
Related Identifiers
Affected Products
References · 50
- 🔥 https://cloud.google.com/blog/topics/threat-intelligence/viewstate-deserialization-zero-day-vulnerability · Exploit
- https://support.sitecore.com/kb?id=kb_article_view&sysparm_article=KB1003865 · Security Note, Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-53690 · Security Note
- https://t.me/ZerodayAlert/547 · Telegram Post
- https://twitter.com/TechNadu/status/1963623222538076658 · Twitter Post
- https://twitter.com/TweetThreatNews/status/1963973729697841370 · Twitter Post
- https://twitter.com/ptdbugs/status/1963941256700031177 · Twitter Post
- https://twitter.com/rxerium/status/1963695628539597145 · Twitter Post
- https://t.me/aptreports/21798 · Telegram Post
- https://twitter.com/MrsYisWhy/status/1963325478338458015 · Twitter Post
- https://twitter.com/evanderburg/status/1963568128665002299 · Twitter Post
- https://t.me/true_secator/7396 · Telegram Post
- https://twitter.com/WatchtowerNexus/status/1963409610142073231 · Twitter Post
- https://twitter.com/oxhak/status/1963580490390118704 · Twitter Post
- https://twitter.com/moton/status/1963735335105691875 · Twitter Post