Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-2794: CWE-470 Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') in Kentico Xperience

0
High
VulnerabilityCVE-2025-2794cvecve-2025-2794cwe-470
Published: Mon Mar 31 2025 (03/31/2025, 16:22:48 UTC)
Source: CVE Database V5
Vendor/Project: Kentico
Product: Xperience

Description

An unsafe reflection vulnerability in Kentico Xperience allows an unauthenticated attacker to kill the current process, leading to a Denial-of-Service condition. This issue affects Xperience: through 13.0.180.

AI-Powered Analysis

AILast updated: 11/19/2025, 13:15:23 UTC

Technical Analysis

CVE-2025-2794 is an unsafe reflection vulnerability identified in Kentico Xperience, a popular content management system (CMS) used for building websites and digital experiences. The vulnerability is classified under CWE-470, which involves the use of externally-controlled input to select classes or code dynamically, leading to unsafe reflection. In this case, the flaw allows an unauthenticated attacker to send crafted requests that manipulate the reflection mechanism, causing the application to terminate its process unexpectedly. This results in a denial-of-service (DoS) condition, disrupting the availability of the affected service. The vulnerability affects all versions of Kentico Xperience up to and including 13.0.180. The CVSS 4.0 base score is 8.7 (high severity), reflecting the fact that the attack vector is network-based (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and no authentication (AT:N), with a high impact on availability (VA:H). The vulnerability does not affect confidentiality or integrity. No patches or exploit code are currently publicly available, but the risk remains due to the ease of exploitation and the critical nature of availability for web services. The unsafe reflection stems from improper validation or sanitization of input used in reflection calls, which can be exploited to invoke unintended code paths leading to process termination. This vulnerability is particularly concerning for organizations relying on Kentico Xperience for customer-facing websites or internal portals, as service disruption can lead to loss of business continuity and reputational damage.

Potential Impact

For European organizations, the primary impact of CVE-2025-2794 is the potential for denial-of-service attacks against web applications running Kentico Xperience. This can lead to downtime of critical websites, e-commerce platforms, or internal portals, affecting business operations and customer trust. The vulnerability does not expose sensitive data or allow unauthorized data modification, but the loss of availability can have cascading effects, including loss of revenue, reduced productivity, and damage to brand reputation. Organizations in sectors such as retail, government, education, and media that rely on Kentico Xperience for digital presence are particularly vulnerable. Additionally, the ease of exploitation without authentication increases the risk of automated attacks or opportunistic scanning by threat actors. Given the high CVSS score and network accessibility, attackers could launch widespread DoS campaigns targeting vulnerable instances, potentially disrupting services at scale. The lack of known exploits in the wild suggests that immediate exploitation is not yet widespread, but the vulnerability should be treated with urgency to prevent future attacks.

Mitigation Recommendations

1. Apply official patches or updates from Kentico as soon as they become available to address the unsafe reflection vulnerability. 2. Until patches are released, restrict access to Kentico Xperience management and reflection-related endpoints by implementing network-level controls such as IP whitelisting or VPN access. 3. Deploy Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests that attempt to exploit reflection mechanisms or contain unusual input patterns targeting class selection. 4. Conduct thorough input validation and sanitization on all user-supplied data used in reflection or dynamic code execution paths within custom modules or extensions. 5. Monitor application logs and network traffic for anomalous activity indicative of exploitation attempts, such as repeated malformed requests or process crashes. 6. Implement robust process monitoring and automatic restart mechanisms to minimize downtime in case of process termination. 7. Educate development and operations teams about the risks of unsafe reflection and secure coding practices to prevent similar vulnerabilities in the future. 8. Review and harden server and application configurations to reduce the attack surface, including disabling unnecessary reflection features if possible.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-03-25T15:19:01.521Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 690a3b69ff58c9332ff0a5e8

Added to database: 11/4/2025, 5:44:09 PM

Last enriched: 11/19/2025, 1:15:23 PM

Last updated: 12/20/2025, 5:15:57 PM

Views: 61

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats