CVE-2025-27801: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Optimizely Episerver Content Management System (CMS)
The Episerver Content Management System (CMS) by Optimizely was affected by multiple Stored Cross-Site Scripting (XSS) vulnerabilities. This allowed an authenticated attacker to execute malicious JavaScript code in the victim's browser. ContentReference properties, which could be used in the "Edit" section of the CMS, offered an upload functionality for documents. These documents could later be used as displayed content on the page. It was possible to upload SVG files that include malicious JavaScript code that would be executed if a user visited the direct URL of the preview image. Attackers needed at least the role "WebEditor" in order to exploit this issue. Affected products: Version 11.X: EPiServer.CMS.Core (<11.21.4) with EPiServer.CMS.UI (<11.37.5), Version 12.X: EPiServer.CMS.Core (<12.22.1) with EPiServer.CMS.UI (<11.37.3)
AI Analysis
Technical Summary
CVE-2025-27801 is a medium-severity stored Cross-Site Scripting (XSS) vulnerability affecting the Optimizely Episerver Content Management System (CMS) versions 11.x and 12.x. The vulnerability arises from improper neutralization of input during web page generation (CWE-79). Specifically, the issue is linked to the ContentReference properties within the CMS's "Edit" section, which allow authenticated users with at least the "WebEditor" role to upload documents, including SVG files. SVG files can contain embedded JavaScript code, and due to insufficient sanitization or validation, malicious scripts embedded in these SVG files are executed when a user accesses the direct URL of the preview image. This stored XSS flaw enables an attacker to execute arbitrary JavaScript in the context of the victim's browser, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of the victim. The vulnerability affects EPiServer.CMS.Core versions prior to 11.21.4 and 12.22.1, and EPiServer.CMS.UI versions prior to 11.37.5 and 11.37.3 respectively. Exploitation requires authenticated access with elevated privileges (WebEditor role), and user interaction is necessary to trigger the malicious payload by visiting the preview image URL. No known exploits are currently reported in the wild, and no official patches are linked in the provided data, though updates to the specified versions likely address the issue. The CVSS v4.0 score of 4.6 reflects a medium severity, considering network attack vector, low complexity, required privileges, and user interaction.
Potential Impact
For European organizations using the Optimizely Episerver CMS, this vulnerability poses a risk primarily to internal users and content editors who have the WebEditor role or higher. Successful exploitation could lead to unauthorized script execution in the browsers of users who preview uploaded SVG content, potentially compromising session tokens, enabling phishing attacks, or facilitating lateral movement within the CMS environment. This could result in unauthorized content manipulation, data leakage, or reputational damage. Given the CMS's role in managing web content, exploitation could also lead to defacement or distribution of malicious content to end-users. The impact is particularly relevant for organizations with complex content workflows and multiple editors, such as media companies, government agencies, and large enterprises prevalent in Europe. The requirement for authenticated access limits the attack surface but does not eliminate risk, especially in environments with weak access controls or insider threats. Additionally, the vulnerability could be leveraged as part of a broader attack chain targeting European organizations relying on this CMS for public-facing or internal websites.
Mitigation Recommendations
1. Immediate upgrade to the fixed versions of EPiServer.CMS.Core (>=11.21.4 for 11.x and >=12.22.1 for 12.x) and EPiServer.CMS.UI (>=11.37.5 for 11.x and >=11.37.3 for 12.x) once available from Optimizely. 2. Implement strict input validation and sanitization on uploaded SVG files, including disabling or filtering out embedded scripts within SVG content at the application or proxy level. 3. Restrict the WebEditor role assignment to trusted personnel only and review role-based access controls regularly to minimize the number of users who can upload content. 4. Employ Content Security Policy (CSP) headers to limit the execution of inline scripts and restrict sources of executable scripts on CMS-managed pages. 5. Monitor CMS logs and user activities for unusual upload patterns or access to preview URLs that could indicate exploitation attempts. 6. Educate content editors about the risks of uploading untrusted SVG files and encourage the use of sanitized image formats. 7. If immediate patching is not feasible, consider disabling SVG uploads or preview functionality temporarily to reduce exposure.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Norway, Denmark, Finland
CVE-2025-27801: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Optimizely Episerver Content Management System (CMS)
Description
The Episerver Content Management System (CMS) by Optimizely was affected by multiple Stored Cross-Site Scripting (XSS) vulnerabilities. This allowed an authenticated attacker to execute malicious JavaScript code in the victim's browser. ContentReference properties, which could be used in the "Edit" section of the CMS, offered an upload functionality for documents. These documents could later be used as displayed content on the page. It was possible to upload SVG files that include malicious JavaScript code that would be executed if a user visited the direct URL of the preview image. Attackers needed at least the role "WebEditor" in order to exploit this issue. Affected products: Version 11.X: EPiServer.CMS.Core (<11.21.4) with EPiServer.CMS.UI (<11.37.5), Version 12.X: EPiServer.CMS.Core (<12.22.1) with EPiServer.CMS.UI (<11.37.3)
AI-Powered Analysis
Technical Analysis
CVE-2025-27801 is a medium-severity stored Cross-Site Scripting (XSS) vulnerability affecting the Optimizely Episerver Content Management System (CMS) versions 11.x and 12.x. The vulnerability arises from improper neutralization of input during web page generation (CWE-79). Specifically, the issue is linked to the ContentReference properties within the CMS's "Edit" section, which allow authenticated users with at least the "WebEditor" role to upload documents, including SVG files. SVG files can contain embedded JavaScript code, and due to insufficient sanitization or validation, malicious scripts embedded in these SVG files are executed when a user accesses the direct URL of the preview image. This stored XSS flaw enables an attacker to execute arbitrary JavaScript in the context of the victim's browser, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of the victim. The vulnerability affects EPiServer.CMS.Core versions prior to 11.21.4 and 12.22.1, and EPiServer.CMS.UI versions prior to 11.37.5 and 11.37.3 respectively. Exploitation requires authenticated access with elevated privileges (WebEditor role), and user interaction is necessary to trigger the malicious payload by visiting the preview image URL. No known exploits are currently reported in the wild, and no official patches are linked in the provided data, though updates to the specified versions likely address the issue. The CVSS v4.0 score of 4.6 reflects a medium severity, considering network attack vector, low complexity, required privileges, and user interaction.
Potential Impact
For European organizations using the Optimizely Episerver CMS, this vulnerability poses a risk primarily to internal users and content editors who have the WebEditor role or higher. Successful exploitation could lead to unauthorized script execution in the browsers of users who preview uploaded SVG content, potentially compromising session tokens, enabling phishing attacks, or facilitating lateral movement within the CMS environment. This could result in unauthorized content manipulation, data leakage, or reputational damage. Given the CMS's role in managing web content, exploitation could also lead to defacement or distribution of malicious content to end-users. The impact is particularly relevant for organizations with complex content workflows and multiple editors, such as media companies, government agencies, and large enterprises prevalent in Europe. The requirement for authenticated access limits the attack surface but does not eliminate risk, especially in environments with weak access controls or insider threats. Additionally, the vulnerability could be leveraged as part of a broader attack chain targeting European organizations relying on this CMS for public-facing or internal websites.
Mitigation Recommendations
1. Immediate upgrade to the fixed versions of EPiServer.CMS.Core (>=11.21.4 for 11.x and >=12.22.1 for 12.x) and EPiServer.CMS.UI (>=11.37.5 for 11.x and >=11.37.3 for 12.x) once available from Optimizely. 2. Implement strict input validation and sanitization on uploaded SVG files, including disabling or filtering out embedded scripts within SVG content at the application or proxy level. 3. Restrict the WebEditor role assignment to trusted personnel only and review role-based access controls regularly to minimize the number of users who can upload content. 4. Employ Content Security Policy (CSP) headers to limit the execution of inline scripts and restrict sources of executable scripts on CMS-managed pages. 5. Monitor CMS logs and user activities for unusual upload patterns or access to preview URLs that could indicate exploitation attempts. 6. Educate content editors about the risks of uploading untrusted SVG files and encourage the use of sanitized image formats. 7. If immediate patching is not feasible, consider disabling SVG uploads or preview functionality temporarily to reduce exposure.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- SEC-VLab
- Date Reserved
- 2025-03-07T06:46:34.309Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68873928ad5a09ad008166a9
Added to database: 7/28/2025, 8:47:36 AM
Last enriched: 8/5/2025, 1:16:06 AM
Last updated: 8/30/2025, 9:07:46 PM
Views: 32
Related Threats
CVE-2025-54588: CWE-416: Use After Free in envoyproxy envoy
HighCVE-2025-9260: CWE-502 Deserialization of Untrusted Data in techjewel Fluent Forms – Customizable Contact Forms, Survey, Quiz, & Conversational Form Builder
MediumCVE-2025-9840: SQL Injection in itsourcecode Sports Management System
MediumCVE-2025-9839: SQL Injection in itsourcecode Student Information Management System
MediumCVE-2025-9838: SQL Injection in itsourcecode Student Information Management System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.