Skip to main content

CVE-2025-49147: CWE-497: Exposure of Sensitive System Information to an Unauthorized Control Sphere in umbraco Umbraco-CMS

Medium
VulnerabilityCVE-2025-49147cvecve-2025-49147cwe-497
Published: Tue Jun 24 2025 (06/24/2025, 17:37:07 UTC)
Source: CVE Database V5
Vendor/Project: umbraco
Product: Umbraco-CMS

Description

Umbraco, a free and open source .NET content management system, has a vulnerability in versions 10.0.0 through 10.8.10 and 13.0.0 through 13.9.1. Via a request to an anonymously authenticated endpoint it's possible to retrieve information about the configured password requirements. The information available is limited but would perhaps give some additional detail useful for someone attempting to brute force derive a user's password. This information was not exposed in Umbraco 7 or 8, nor in 14 or higher versions. The vulnerability is patched in versions 10.8.11 and 13.9.2.

AI-Powered Analysis

AILast updated: 06/24/2025, 18:04:57 UTC

Technical Analysis

CVE-2025-49147 is a medium-severity vulnerability affecting Umbraco CMS versions 10.0.0 through 10.8.10 and 13.0.0 through 13.9.1. Umbraco is a widely used open-source .NET content management system. This vulnerability involves the exposure of sensitive system information related to password requirements via an anonymously accessible endpoint. Specifically, an unauthenticated attacker can send a request to this endpoint and retrieve details about the configured password policies. Although the exposed information is limited, it can aid an attacker in refining brute-force or password-guessing attacks by providing insight into password complexity rules such as minimum length, required character types, or other constraints. This vulnerability does not allow direct access to user credentials or other sensitive data but leaks metadata that reduces the effort needed to compromise user accounts. The flaw is present only in specific Umbraco versions (10.x and 13.x branches) and was not found in earlier versions 7 or 8, nor in version 14 or later. The issue has been patched in versions 10.8.11 and 13.9.2. The CVSS v3.1 base score is 5.3, indicating a medium risk, with an attack vector of network (remote), no privileges required, no user interaction needed, and impact limited to confidentiality (partial information disclosure). There are no known exploits in the wild at this time. The vulnerability is classified under CWE-497, which concerns exposure of sensitive system information to unauthorized entities, potentially aiding further attacks.

Potential Impact

For European organizations using affected Umbraco CMS versions, this vulnerability poses a moderate risk primarily to the confidentiality of password policy information. While it does not directly compromise user credentials or system integrity, the leaked password requirements can facilitate more effective brute-force or credential-stuffing attacks against user accounts. This can increase the likelihood of account compromise, especially if users employ weak or reused passwords. Organizations with public-facing Umbraco CMS installations are particularly at risk since the vulnerable endpoint is anonymously accessible over the network. The impact is more pronounced for entities managing sensitive or critical web content, such as government portals, financial institutions, healthcare providers, and large enterprises, where account compromise could lead to data breaches or service disruptions. However, since the vulnerability does not affect availability or integrity directly, the immediate operational impact is limited. The absence of known exploits reduces the urgency but does not eliminate the risk, as attackers could develop exploits leveraging this information disclosure. Overall, the vulnerability lowers the security posture of affected systems and increases the attack surface for credential-based attacks.

Mitigation Recommendations

1. Upgrade affected Umbraco CMS installations to patched versions 10.8.11 or later for the 10.x branch, and 13.9.2 or later for the 13.x branch. This is the most effective and recommended mitigation. 2. If immediate upgrade is not feasible, implement network-level access controls to restrict access to the vulnerable endpoint, such as web application firewall (WAF) rules or reverse proxy filtering, limiting requests to trusted IP ranges or authenticated users only. 3. Enforce strong password policies and encourage or require multi-factor authentication (MFA) for all user accounts to reduce the risk of brute-force attacks succeeding even if password policy information is known. 4. Monitor authentication logs for unusual login attempts or brute-force patterns, and implement rate limiting or account lockout mechanisms to mitigate automated attacks. 5. Conduct security awareness training for administrators and users about the risks of password reuse and phishing, which can compound the threat. 6. Regularly audit and update CMS components and dependencies to ensure timely application of security patches. 7. Consider deploying anomaly detection tools to identify suspicious access patterns to the CMS or its endpoints. These targeted mitigations go beyond generic advice by focusing on compensating controls and layered defenses tailored to the nature of this information disclosure vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-06-02T10:39:41.635Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 685ae55477d44901f08d324a

Added to database: 6/24/2025, 5:50:12 PM

Last enriched: 6/24/2025, 6:04:57 PM

Last updated: 8/12/2025, 9:42:18 PM

Views: 41

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats