Skip to main content

Kentico Xperience 13.0.178 - Cross Site Scripting (XSS)

Medium
Published: Tue May 13 2025 (05/13/2025, 00:00:00 UTC)
Source: Exploit-DB RSS Feed

Description

Kentico Xperience 13.0.178 - Cross Site Scripting (XSS)

AI-Powered Analysis

AILast updated: 06/11/2025, 21:13:03 UTC

Technical Analysis

The security threat pertains to a Cross Site Scripting (XSS) vulnerability identified in Kentico Xperience version 13.0.178 and earlier. Kentico Xperience is a widely used web content management system (CMS) and digital experience platform. The vulnerability allows an attacker to upload a specially crafted ZIP archive containing an SVG file with embedded malicious JavaScript code. The exploit leverages an unauthenticated file upload endpoint, specifically targeting the MultiFileUploader.ashx handler, by sending a POST request with the ZIP file. Upon successful upload, the malicious SVG file can be rendered by the application or viewed by users, triggering the embedded JavaScript payload. This results in the execution of arbitrary scripts in the context of the victim's browser, enabling theft of session cookies, defacement, or redirection to malicious sites. The provided exploit code is written in Python 3 and automates the creation of the malicious SVG payload, packaging it into a ZIP archive, and uploading it to the vulnerable endpoint. The vulnerability is identified as CVE-2025-32370. No authentication or user interaction is required to exploit this vulnerability, increasing its risk profile. The vulnerability is classified as medium severity, reflecting the typical impact of XSS attacks combined with the ease of exploitation through unauthenticated upload. No official patch links are provided, indicating that mitigation may require manual intervention or vendor updates. The exploit does not appear to be widely exploited in the wild yet, but the availability of proof-of-concept code increases the likelihood of future attacks.

Potential Impact

For European organizations using Kentico Xperience 13.0.178 or earlier, this vulnerability poses a significant risk to web application security and user trust. Successful exploitation can lead to session hijacking, unauthorized actions performed on behalf of users, data leakage, and reputational damage. Since the vulnerability allows unauthenticated attackers to upload malicious content, it can be leveraged to target both internal users and external customers. This is particularly concerning for organizations handling sensitive personal data under GDPR, as XSS attacks can facilitate data breaches. The impact extends to potential regulatory fines and loss of customer confidence. Additionally, attackers may use the vulnerability as a foothold to escalate attacks within the network or distribute malware. The medium severity rating suggests that while the vulnerability is serious, it may not directly lead to full system compromise without additional vulnerabilities. However, the ease of exploitation and the public availability of exploit code increase the urgency for mitigation.

Mitigation Recommendations

1. Immediate upgrade to the latest Kentico Xperience version where this vulnerability is patched. If an official patch is not yet available, contact Kentico support for guidance or apply vendor-recommended workarounds. 2. Implement strict server-side validation and sanitization of uploaded files, especially SVG content, to prevent embedded scripts from executing. 3. Restrict file upload types and enforce content-type validation to disallow SVG or other potentially dangerous file formats unless absolutely necessary. 4. Employ Content Security Policy (CSP) headers to restrict the execution of inline scripts and reduce the impact of XSS attacks. 5. Use Web Application Firewalls (WAF) with rules tuned to detect and block malicious upload attempts and suspicious SVG payloads. 6. Monitor web server logs for unusual POST requests to the MultiFileUploader.ashx endpoint and investigate any anomalies. 7. Educate developers and administrators about secure file upload handling and XSS prevention best practices. 8. Consider disabling or restricting the vulnerable upload endpoint if it is not essential for business operations until a patch is applied.

Need more detailed analysis?Get Pro

Technical Details

Edb Id
52290
Has Exploit Code
true
Code Language
python

Indicators of Compromise

Exploit Source Code

Exploit Code

Exploit code for Kentico Xperience 13.0.178 - Cross Site Scripting (XSS)

# Exploit Title: Kentico Xperience 13.0.178 - Cross Site Scripting (XSS)
# Date: 2025-05-09
# Version: Kentico Xperience before 13.0.178
# Exploit Author: Alex Messham
# Contact: ramessham@gmail.com
# Source: https://github.com/xirtam2669/Kentico-Xperience-before-13.0.178---XSS-POC/
# CVE: CVE-2025-32370

import requests
import subprocess
import os
import argparse

def create_svg_payload(svg_filename: str):
    print(f"[*] Writing malicious SVG to: {svg_filename}")
    svg_payload = '''<?xml ver
... (1796 more characters)
Code Length: 2,296 characters

Threat ID: 68489dea7e6d765d51d5379c

Added to database: 6/10/2025, 9:04:42 PM

Last enriched: 6/11/2025, 9:13:03 PM

Last updated: 8/9/2025, 7:13:21 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats