CVE-2025-27801: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Optimizely Episerver Content Management System (CMS)
The Episerver Content Management System (CMS) by Optimizely was affected by multiple Stored Cross-Site Scripting (XSS) vulnerabilities. This allowed an authenticated attacker to execute malicious JavaScript code in the victim's browser. ContentReference properties, which could be used in the "Edit" section of the CMS, offered an upload functionality for documents. These documents could later be used as displayed content on the page. It was possible to upload SVG files that include malicious JavaScript code that would be executed if a user visited the direct URL of the preview image. Attackers needed at least the role "WebEditor" in order to exploit this issue. Affected products: Version 11.X: EPiServer.CMS.Core (<11.21.4) with EPiServer.CMS.UI (<11.37.5), Version 12.X: EPiServer.CMS.Core (<12.22.1) with EPiServer.CMS.UI (<11.37.3)
AI Analysis
Technical Summary
CVE-2025-27801 is a Stored Cross-Site Scripting (XSS) vulnerability identified in Optimizely's Episerver Content Management System (CMS) affecting versions 11.x (EPiServer.CMS.Core <11.21.4 with EPiServer.CMS.UI <11.37.5) and 12.x (EPiServer.CMS.Core <12.22.1 with EPiServer.CMS.UI <11.37.3). The vulnerability stems from improper neutralization of input during web page generation (CWE-79). Specifically, the ContentReference properties in the CMS's Edit section allow authenticated users with the WebEditor role to upload documents, including SVG files. SVG files can embed JavaScript code, which is executed when a user accesses the direct URL of the preview image. This stored XSS flaw enables an attacker to execute arbitrary JavaScript in the context of the victim's browser session, potentially leading to session hijacking, privilege escalation, or unauthorized actions within the CMS interface. The attack vector requires the attacker to have at least WebEditor privileges, meaning exploitation is limited to authenticated users with elevated roles. The vulnerability does not require user interaction beyond visiting the preview image URL. The CVSS 4.0 base score is 4.6, reflecting medium severity due to the requirement for authentication and user interaction, limited scope, and low impact on confidentiality but some impact on integrity and availability. No public exploits or active exploitation in the wild have been reported to date. The vulnerability highlights the risk of insufficient input sanitization for SVG uploads and the need for strict content validation in CMS platforms.
Potential Impact
For European organizations using the affected versions of Optimizely Episerver CMS, this vulnerability poses a moderate risk. Attackers with WebEditor access could embed malicious scripts that execute in the browsers of other users, potentially leading to session hijacking, unauthorized content modification, or further lateral movement within the CMS environment. This could compromise the integrity of published content and damage organizational reputation. Since the vulnerability requires authenticated access, the risk is primarily internal or from compromised accounts. However, organizations with large editorial teams or third-party contributors are at higher risk. The impact on availability is limited but could include denial of service if malicious scripts disrupt CMS functionality. Confidentiality impact is low but not negligible if session tokens or sensitive data are exposed. Given the widespread use of Episerver CMS in European public sector, media, and corporate websites, exploitation could affect critical information infrastructure and public-facing services. The vulnerability also raises compliance concerns under GDPR if personal data is exposed or manipulated.
Mitigation Recommendations
Organizations should immediately upgrade to the fixed versions of Episerver CMS: 11.21.4 or later for 11.x and 12.22.1 or later for 12.x branches once patches are released. Until patches are available, restrict the WebEditor role to trusted personnel only and monitor their activities closely. Implement strict input validation and sanitization on uploaded SVG files, potentially disabling SVG uploads if not essential. Employ Content Security Policy (CSP) headers to limit the execution of inline scripts and reduce XSS impact. Conduct regular audits of uploaded content for suspicious files. Enhance authentication mechanisms with multi-factor authentication (MFA) to reduce the risk of compromised accounts. Educate CMS users about phishing and social engineering risks that could lead to credential theft. Monitor web server logs for unusual access patterns to preview URLs. Finally, consider deploying web application firewalls (WAF) with custom rules to detect and block malicious SVG payloads.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Norway, Denmark, Finland, Belgium, Italy
CVE-2025-27801: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Optimizely Episerver Content Management System (CMS)
Description
The Episerver Content Management System (CMS) by Optimizely was affected by multiple Stored Cross-Site Scripting (XSS) vulnerabilities. This allowed an authenticated attacker to execute malicious JavaScript code in the victim's browser. ContentReference properties, which could be used in the "Edit" section of the CMS, offered an upload functionality for documents. These documents could later be used as displayed content on the page. It was possible to upload SVG files that include malicious JavaScript code that would be executed if a user visited the direct URL of the preview image. Attackers needed at least the role "WebEditor" in order to exploit this issue. Affected products: Version 11.X: EPiServer.CMS.Core (<11.21.4) with EPiServer.CMS.UI (<11.37.5), Version 12.X: EPiServer.CMS.Core (<12.22.1) with EPiServer.CMS.UI (<11.37.3)
AI-Powered Analysis
Technical Analysis
CVE-2025-27801 is a Stored Cross-Site Scripting (XSS) vulnerability identified in Optimizely's Episerver Content Management System (CMS) affecting versions 11.x (EPiServer.CMS.Core <11.21.4 with EPiServer.CMS.UI <11.37.5) and 12.x (EPiServer.CMS.Core <12.22.1 with EPiServer.CMS.UI <11.37.3). The vulnerability stems from improper neutralization of input during web page generation (CWE-79). Specifically, the ContentReference properties in the CMS's Edit section allow authenticated users with the WebEditor role to upload documents, including SVG files. SVG files can embed JavaScript code, which is executed when a user accesses the direct URL of the preview image. This stored XSS flaw enables an attacker to execute arbitrary JavaScript in the context of the victim's browser session, potentially leading to session hijacking, privilege escalation, or unauthorized actions within the CMS interface. The attack vector requires the attacker to have at least WebEditor privileges, meaning exploitation is limited to authenticated users with elevated roles. The vulnerability does not require user interaction beyond visiting the preview image URL. The CVSS 4.0 base score is 4.6, reflecting medium severity due to the requirement for authentication and user interaction, limited scope, and low impact on confidentiality but some impact on integrity and availability. No public exploits or active exploitation in the wild have been reported to date. The vulnerability highlights the risk of insufficient input sanitization for SVG uploads and the need for strict content validation in CMS platforms.
Potential Impact
For European organizations using the affected versions of Optimizely Episerver CMS, this vulnerability poses a moderate risk. Attackers with WebEditor access could embed malicious scripts that execute in the browsers of other users, potentially leading to session hijacking, unauthorized content modification, or further lateral movement within the CMS environment. This could compromise the integrity of published content and damage organizational reputation. Since the vulnerability requires authenticated access, the risk is primarily internal or from compromised accounts. However, organizations with large editorial teams or third-party contributors are at higher risk. The impact on availability is limited but could include denial of service if malicious scripts disrupt CMS functionality. Confidentiality impact is low but not negligible if session tokens or sensitive data are exposed. Given the widespread use of Episerver CMS in European public sector, media, and corporate websites, exploitation could affect critical information infrastructure and public-facing services. The vulnerability also raises compliance concerns under GDPR if personal data is exposed or manipulated.
Mitigation Recommendations
Organizations should immediately upgrade to the fixed versions of Episerver CMS: 11.21.4 or later for 11.x and 12.22.1 or later for 12.x branches once patches are released. Until patches are available, restrict the WebEditor role to trusted personnel only and monitor their activities closely. Implement strict input validation and sanitization on uploaded SVG files, potentially disabling SVG uploads if not essential. Employ Content Security Policy (CSP) headers to limit the execution of inline scripts and reduce XSS impact. Conduct regular audits of uploaded content for suspicious files. Enhance authentication mechanisms with multi-factor authentication (MFA) to reduce the risk of compromised accounts. Educate CMS users about phishing and social engineering risks that could lead to credential theft. Monitor web server logs for unusual access patterns to preview URLs. Finally, consider deploying web application firewalls (WAF) with custom rules to detect and block malicious SVG payloads.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- SEC-VLab
- Date Reserved
- 2025-03-07T06:46:34.309Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68873928ad5a09ad008166a9
Added to database: 7/28/2025, 8:47:36 AM
Last enriched: 11/4/2025, 2:28:48 AM
Last updated: 12/3/2025, 11:55:38 PM
Views: 85
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-62173: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in FreePBX security-reporting
HighCVE-2025-64055: n/a
UnknownCVE-2025-66404: CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') in Flux159 mcp-server-kubernetes
MediumCVE-2025-66293: CWE-125: Out-of-bounds Read in pnggroup libpng
HighCVE-2025-65868: n/a
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.