CVE-2025-66625: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in umbraco Umbraco-CMS
Umbraco is an ASP.NET CMS. Due to unsafe handling and deletion of temporary files in versions 10.0.0 through 13.12.0, during the dictionary upload process an attacker with access to the backoffice can trigger predictable requests to temporary file paths. The application’s error responses (HTTP 500 when a file exists, 404 when it does not) allow the attacker to enumerate the existence of arbitrary files on the server’s filesystem. This vulnerability does not allow reading or writing file contents. In certain configurations, incomplete clean-up of temporary upload files may additionally expose the NTLM hash of the Windows account running the Umbraco application. This issue is fixed in version 13.12.1.
AI Analysis
Technical Summary
CVE-2025-66625 affects Umbraco CMS, an ASP.NET-based content management system widely used for web content management. The vulnerability stems from improper handling and deletion of temporary files created during the dictionary upload process in versions 10.0.0 through 13.12.0. An attacker with authenticated backoffice access can send crafted requests targeting predictable temporary file paths. The application’s error responses differ based on whether the targeted temporary file exists: HTTP 500 if the file exists and HTTP 404 if it does not. This discrepancy allows the attacker to enumerate the presence of arbitrary files on the server’s filesystem, effectively exposing sensitive information about the server environment. While the vulnerability does not permit reading or modifying file contents directly, certain configurations where temporary upload files are not fully cleaned up may inadvertently expose the NTLM hash of the Windows account under which the Umbraco application runs. This NTLM hash exposure is critical because it can be used in offline brute-force attacks or relay attacks to compromise credentials. The vulnerability requires the attacker to have valid backoffice credentials, meaning it is not exploitable by unauthenticated users. No user interaction is required beyond the attacker’s own actions. The vulnerability has a CVSS 3.1 base score of 4.9 (medium severity), reflecting its moderate impact and the requirement for privileged access. The issue was publicly disclosed on December 9, 2025, and fixed in Umbraco CMS version 13.12.1.
Potential Impact
For European organizations using Umbraco CMS versions 10.0.0 through 13.12.0, this vulnerability poses a risk of sensitive information exposure through file enumeration and potential NTLM hash leakage. File enumeration can aid attackers in mapping the server filesystem, identifying sensitive files, or discovering configuration files that could facilitate further attacks. Exposure of NTLM hashes is particularly concerning in Windows environments common in Europe, as it can lead to credential compromise, lateral movement, and privilege escalation within corporate networks. Organizations with strict data protection requirements under GDPR may face compliance risks if sensitive information is leaked. The requirement for authenticated backoffice access limits the threat to insiders or attackers who have already compromised credentials, but the vulnerability could be exploited by malicious insiders or attackers who have gained backoffice access through phishing or credential theft. The lack of known exploits in the wild reduces immediate risk, but organizations should act promptly to patch and mitigate. The impact on availability and integrity is minimal, but confidentiality is significantly affected due to information disclosure and credential exposure.
Mitigation Recommendations
European organizations should immediately upgrade Umbraco CMS to version 13.12.1 or later to remediate this vulnerability. Until patching is possible, restrict backoffice access strictly to trusted personnel and enforce strong multi-factor authentication (MFA) to reduce the risk of credential compromise. Review and harden file system permissions to limit access to temporary upload directories and ensure proper cleanup of temporary files. Monitor server logs for unusual HTTP 500 and 404 error patterns that could indicate file enumeration attempts. Implement network segmentation to isolate CMS servers from critical internal systems, reducing the impact of potential credential exposure. Conduct regular audits of backoffice user accounts and revoke unnecessary privileges. Employ Windows security best practices to protect NTLM hashes, such as enabling SMB signing and restricting NTLM usage where feasible. Finally, educate staff about phishing and credential security to prevent initial backoffice compromise.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Italy, Spain
CVE-2025-66625: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in umbraco Umbraco-CMS
Description
Umbraco is an ASP.NET CMS. Due to unsafe handling and deletion of temporary files in versions 10.0.0 through 13.12.0, during the dictionary upload process an attacker with access to the backoffice can trigger predictable requests to temporary file paths. The application’s error responses (HTTP 500 when a file exists, 404 when it does not) allow the attacker to enumerate the existence of arbitrary files on the server’s filesystem. This vulnerability does not allow reading or writing file contents. In certain configurations, incomplete clean-up of temporary upload files may additionally expose the NTLM hash of the Windows account running the Umbraco application. This issue is fixed in version 13.12.1.
AI-Powered Analysis
Technical Analysis
CVE-2025-66625 affects Umbraco CMS, an ASP.NET-based content management system widely used for web content management. The vulnerability stems from improper handling and deletion of temporary files created during the dictionary upload process in versions 10.0.0 through 13.12.0. An attacker with authenticated backoffice access can send crafted requests targeting predictable temporary file paths. The application’s error responses differ based on whether the targeted temporary file exists: HTTP 500 if the file exists and HTTP 404 if it does not. This discrepancy allows the attacker to enumerate the presence of arbitrary files on the server’s filesystem, effectively exposing sensitive information about the server environment. While the vulnerability does not permit reading or modifying file contents directly, certain configurations where temporary upload files are not fully cleaned up may inadvertently expose the NTLM hash of the Windows account under which the Umbraco application runs. This NTLM hash exposure is critical because it can be used in offline brute-force attacks or relay attacks to compromise credentials. The vulnerability requires the attacker to have valid backoffice credentials, meaning it is not exploitable by unauthenticated users. No user interaction is required beyond the attacker’s own actions. The vulnerability has a CVSS 3.1 base score of 4.9 (medium severity), reflecting its moderate impact and the requirement for privileged access. The issue was publicly disclosed on December 9, 2025, and fixed in Umbraco CMS version 13.12.1.
Potential Impact
For European organizations using Umbraco CMS versions 10.0.0 through 13.12.0, this vulnerability poses a risk of sensitive information exposure through file enumeration and potential NTLM hash leakage. File enumeration can aid attackers in mapping the server filesystem, identifying sensitive files, or discovering configuration files that could facilitate further attacks. Exposure of NTLM hashes is particularly concerning in Windows environments common in Europe, as it can lead to credential compromise, lateral movement, and privilege escalation within corporate networks. Organizations with strict data protection requirements under GDPR may face compliance risks if sensitive information is leaked. The requirement for authenticated backoffice access limits the threat to insiders or attackers who have already compromised credentials, but the vulnerability could be exploited by malicious insiders or attackers who have gained backoffice access through phishing or credential theft. The lack of known exploits in the wild reduces immediate risk, but organizations should act promptly to patch and mitigate. The impact on availability and integrity is minimal, but confidentiality is significantly affected due to information disclosure and credential exposure.
Mitigation Recommendations
European organizations should immediately upgrade Umbraco CMS to version 13.12.1 or later to remediate this vulnerability. Until patching is possible, restrict backoffice access strictly to trusted personnel and enforce strong multi-factor authentication (MFA) to reduce the risk of credential compromise. Review and harden file system permissions to limit access to temporary upload directories and ensure proper cleanup of temporary files. Monitor server logs for unusual HTTP 500 and 404 error patterns that could indicate file enumeration attempts. Implement network segmentation to isolate CMS servers from critical internal systems, reducing the impact of potential credential exposure. Conduct regular audits of backoffice user accounts and revoke unnecessary privileges. Employ Windows security best practices to protect NTLM hashes, such as enabling SMB signing and restricting NTLM usage where feasible. Finally, educate staff about phishing and credential security to prevent initial backoffice compromise.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-12-05T15:18:02.789Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69388517f4a79be77cca2bd3
Added to database: 12/9/2025, 8:22:47 PM
Last enriched: 12/9/2025, 8:37:56 PM
Last updated: 12/10/2025, 10:00:24 PM
Views: 12
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-66472: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in xwiki xwiki-platform
MediumCVE-2025-66033: CWE-401: Missing Release of Memory after Effective Lifetime in okta okta-sdk-java
MediumCVE-2025-65295: n/a
UnknownCVE-2025-65294: n/a
CriticalCVE-2025-65293: n/a
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.