Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-22390: CWE-521 Weak Password Requirements

0
High
VulnerabilityCVE-2025-22390cvecve-2025-22390cwe-521
Published: Sat Jan 04 2025 (01/04/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2025-22390 is a high-severity vulnerability in Optimizely EPiServer. CMS. Core versions before 12. 32. 0 caused by weak password requirements. The CMS allows users to set passwords with a minimum length of only six characters and lacks enforcement of complexity rules, making it vulnerable to password spraying and offline cracking attacks. The vulnerability has a CVSS score of 7. 5, indicating a significant risk as it can be exploited remotely without authentication or user interaction. Although no known exploits are currently in the wild, the weakness in password policy could lead to unauthorized access, compromising confidentiality. Organizations using affected versions should prioritize updating to versions with improved password policies or implement compensating controls.

AI-Powered Analysis

AILast updated: 02/25/2026, 22:12:59 UTC

Technical Analysis

CVE-2025-22390 identifies a vulnerability in Optimizely EPiServer.CMS.Core prior to version 12.32.0, where the system enforces insufficient password complexity requirements. Specifically, the CMS permits users to create passwords with a minimum length of six characters without mandating complexity elements such as uppercase letters, digits, or special characters. This weakness aligns with CWE-521, which describes weak password requirements that fail to resist modern attack techniques. The vulnerability is remotely exploitable without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). Attackers can leverage this flaw to perform password spraying attacks or offline password cracking, potentially gaining unauthorized access to user accounts or administrative functions. While no public exploits have been reported, the vulnerability poses a high risk due to the ease of exploitation and the potential impact on confidentiality. The affected product, Optimizely EPiServer.CMS.Core, is widely used in content management deployments, making this a significant concern for organizations relying on this CMS for web content delivery and management. The lack of patch links suggests that remediation may require upgrading to version 12.32.0 or later, where password policies are presumably strengthened.

Potential Impact

The primary impact of this vulnerability is unauthorized access due to weak password policies, which can lead to confidentiality breaches. Attackers exploiting this flaw can gain access to user accounts, potentially including administrative accounts, allowing them to view sensitive content or manipulate CMS configurations. Although integrity and availability impacts are not directly indicated, unauthorized access could be leveraged to deface websites, inject malicious content, or disrupt services indirectly. The ease of exploitation without authentication or user interaction increases the risk of widespread attacks, especially via automated password spraying tools. Organizations worldwide using affected versions of Optimizely EPiServer.CMS.Core face increased risk of compromise, data leakage, and reputational damage. The vulnerability also raises compliance concerns for organizations subject to data protection regulations requiring strong authentication controls.

Mitigation Recommendations

Organizations should immediately assess their use of Optimizely EPiServer.CMS.Core and upgrade to version 12.32.0 or later, where password complexity enforcement is improved. In the absence of an available patch, administrators should implement compensating controls such as enforcing stronger password policies via custom configuration or integration with external authentication providers that mandate complexity and length requirements. Deploying multi-factor authentication (MFA) is critical to reduce the risk of account compromise even if weak passwords are used. Monitoring authentication logs for unusual login attempts, such as repeated failed logins indicative of password spraying, can help detect exploitation attempts early. Additionally, organizations should educate users on creating strong passwords and consider implementing account lockout policies after multiple failed attempts to hinder brute-force attacks. Regular security audits and penetration testing focusing on authentication mechanisms will help identify residual weaknesses.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-01-04T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6b1bb7ef31ef0b54e305

Added to database: 2/25/2026, 9:35:23 PM

Last enriched: 2/25/2026, 10:12:59 PM

Last updated: 2/26/2026, 9:23:29 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats