Cyber Security News

CISA Adds Sitecore CMS Code Execution Vulnerability to Exploited List

 The Cybersecurity and Infrastructure Security Agency (CISA) has included a critical deserialization vulnerability affecting Sitecore CMS and Experience Platform (XP).

This vulnerability, tracked as CVE-2019-9874, allows unauthenticated attackers to execute arbitrary code by manipulating HTTP POST parameters, specifically the __CSRFTOKEN field.

The vulnerability exploits a weakness in the Sitecore.Security.AntiCSRF module, enabling malicious actors to send maliciously crafted serialized .NET objects.

CVE-2019-9874: Deserialization Vulnerability

CVE-2019-9874 is aligned with the Common Weakness Enumeration (CWE) entry CWE-502, which pertains to deserialization of untrusted data.

Deserialization vulnerabilities are particularly dangerous because they can allow attackers to perform complex operations on the affected system without having to authenticate first.

In this case, by sending a specially crafted HTTP POST request, attackers could potentially execute arbitrary code on systems running Sitecore CMS and XP versions that have not been patched or mitigated.

Despite being identified several years ago, this vulnerability has recently gained attention from CISA, highlighting ongoing concerns about its potential exploitation in active attacks.

While there is no confirmed evidence of its use in ransomware campaigns to date, the inclusion on CISA’s exploited list underscores the potential for malicious actors to leverage it in future attacks.

Recommendations for Mitigation

In response to this vulnerability, CISA and security experts recommend taking immediate action to protect affected systems:

  • Apply Vendor Mitigations: Ensure that all systems are updated with the latest patches and follow vendor guidance for secure configuration.
  • Follow Applicable Guidelines: For cloud services, adhere to the Binding Operational Directive (BOD) 22-01, which outlines best practices for securing cloud environments.
  • Discontinue Unsecured Use: If mitigations are not available or cannot be applied in a timely manner, consider discontinuing the use of the product to prevent exploitation.

The deadline for addressing this vulnerability has been set for April 16, 2025, emphasizing the need for prompt action to secure systems.

Organizations relying on Sitecore CMS and Experience Platform (XP) must act swiftly to protect against potential attacks and prevent exploitation of this critical vulnerability.

This development serves as a reminder of the importance of maintaining up-to-date software and following best practices in cybersecurity, particularly for platforms that handle critical data or services.

As cybersecurity threats evolve, staying informed about known vulnerabilities and taking proactive measures is crucial for safeguarding digital assets.

Are you from SOC/DFIR Teams? – Analyse Malware, Phishing Incidents & get live Access with ANY.RUN -> Start Now for Free. 

Divya

Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Recent Posts

Operation HollowQuill – Weaponized PDFs Deliver a Cobalt Strike Malware Into Gov & Military Networks

In a recent revelation by SEQRITE Labs, a highly sophisticated cyber-espionage campaign, dubbed Operation HollowQuill,…

9 hours ago

Earth Alux Hackers Use VARGIET Malware to Target Organizations

A new wave of cyberattacks orchestrated by the advanced persistent threat (APT) group Earth Alux…

9 hours ago

“Lazarus Hackers Group” No Longer Refer to a Single APT Group But a Collection of Many Sub-Groups

The term "Lazarus Group," once used to describe a singular Advanced Persistent Threat (APT) actor,…

9 hours ago

DarkCloud: An Advanced Stealer Malware Sold on Telegram to Target Windows Data

DarkCloud, a highly advanced stealer malware, has emerged as a significant threat to Windows systems…

9 hours ago

Triton RAT Uses Telegram for Remote System Access and Control

Cado Security Labs has uncovered a new Python-based Remote Access Tool (RAT) named Triton RAT,…

9 hours ago

Russian Hackers Leverage Bulletproof Hosting to Shift Network Infrastructure

Russian-aligned cyber threat groups, UAC-0050 and UAC-0006, have significantly escalated their operations in 2025, targeting…

9 hours ago