Uncategorized

Critical Vulnerabilities in Sitecore Experience Platform Put Thousands of Enterprise Systems at Risk

A critical vulnerability chain in Sitecore Experience Platform that allows attackers to gain complete control of enterprise systems without authentication.

The Vulnerabilities affect versions 10.1 through 10.4 of the popular content management system, potentially exposing over 22,000 instances currently accessible online.

The investigation began when researchers discovered that Sitecore installations contain hardcoded user credentials, with one internal account having a password set to just the single letter “b”.

The affected account, “sitecore\ServicesAPI,” uses this trivial password across all installations of vulnerable versions, representing what security experts describe as an inexcusable security practice for enterprise software.

The hardcoded credentials originated from Sitecore’s installation process, where pre-configured database files automatically create these weak passwords during deployment.

Analysis of multiple Sitecore versions revealed that while earlier releases used stronger passwords for internal accounts, something went wrong during the build process for version 10.1, introducing the single-character password that persisted through subsequent releases.

Researchers noted the particular significance of the letter “b,” which historically served as the default administrator password in older Sitecore versions.

This nostalgic callback became a critical security vulnerability when applied to internal service accounts that administrators typically never modify, following vendor guidance not to alter default user accounts.

Vulnerabilities in Sitecore Experience Platform

While the hardcoded credentials alone provide limited access, researchers demonstrated how they can be chained with additional vulnerabilities to achieve remote code execution.

The attack sequence involves authenticating with the compromised credentials, then exploiting file upload mechanisms to deploy malicious code on target servers.

Two separate post-authentication vulnerabilities enable the final compromise. The first involves a “zip slip” path traversal vulnerability in Sitecore’s file upload functionality, allowing attackers to write files outside intended directories.

The second affects the popular Sitecore PowerShell Extension, which permits unrestricted file uploads to arbitrary filesystem locations.

The complete attack chain requires no user interaction and can be executed remotely against any vulnerable Sitecore instance.

Once successful, attackers gain the ability to execute arbitrary code with the privileges of the web application, potentially leading to full server compromise.

Widespread Exposure Continues

Security firm watchTowr reported the vulnerabilities to Sitecore in February 2025, with patches becoming available in version 10.4 by May.

However, the delayed public disclosure until June 17, 2025, means many organizations may remain unaware of their exposure.

The vulnerability affects Sitecore installations deployed using vulnerable installers, though systems upgraded from earlier versions may not be impacted if they retained their original databases.

CVE identifiers are expected to be assigned following the public disclosure.

Organizations running Sitecore Experience Platform should immediately verify their version and apply available patches.

The combination of hardcoded credentials and file upload vulnerabilities represents a critical security risk that demands immediate attention from enterprise security teams.

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates.

Ethan Brooks

Ethan Brooks is a Senior cybersecurity journalist passionate about threat intelligence and data privacy. His work highlights cyber attacks, hacking, security culture, and cybercrime with The Cyber News.

Recent Posts

Burp Suite Supercharges Its Scanning Capabilities With React2Shell Vulnerability Detection

PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…

4 months ago

Malicious MCP Servers Enable New Prompt Injection Attack To Drain Resources

Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…

4 months ago

Law Enforcement Detains Hackers Equipped With Specialized Flipper Hacking Tools

Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…

4 months ago

Google Unveils 10 New Gemini-Powered AI Features For Chrome

Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…

4 months ago

CISA Alerts On Actively Exploited Buffer Overflow Flaw In D-Link Routers

Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…

4 months ago

Over 500 Apache Tika Toolkit Instances Exposed To Critical XXE Vulnerability

Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…

4 months ago