Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Cyber teams on alert as React2Shell exploitation spreads

    Interview: Paul Neville, director of digital, data and technology, The Pensions Regulator

    Edinburgh Airport grounds flights due to IT issue affecting air traffic control provider

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      Apple’s AI chief abruptly steps down

      December 3, 2025

      The issue that’s scrambling both parties: From the Politics Desk

      December 3, 2025

      More of Silicon Valley is building on free Chinese AI

      December 1, 2025

      From Steve Bannon to Elizabeth Warren, backlash erupts over push to block states from regulating AI

      November 23, 2025

      Insurance companies are trying to avoid big payouts by making AI safer

      November 19, 2025
    • Business

      Public GitLab repositories exposed more than 17,000 secrets

      November 29, 2025

      ASUS warns of new critical auth bypass flaw in AiCloud routers

      November 28, 2025

      Windows 11 gets new Cloud Rebuild, Point-in-Time Restore tools

      November 18, 2025

      Government faces questions about why US AWS outage disrupted UK tax office and banking firms

      October 23, 2025

      Amazon’s AWS outage knocked services like Alexa, Snapchat, Fortnite, Venmo and more offline

      October 21, 2025
    • Crypto

      Terra Luna Classic (LUNC) Soars 100% After Viral T-Shirt Moment in Dubai

      December 6, 2025

      Yi He to Women: “No One Goes Easy on You in Business”

      December 6, 2025

      Maryland Man’s Fraud Conviction Highlights North Korea’s Rising Crypto Threat

      December 6, 2025

      Is Elon Musk’s SpaceX Really Selling Its Bitcoin, Or It’s Just FUD?

      December 6, 2025

      What Does the Market Structure Bill ‘CLARITY Act’ Need to Pass in 2026?

      December 6, 2025
    • Technology

      Cyber teams on alert as React2Shell exploitation spreads

      December 6, 2025

      Interview: Paul Neville, director of digital, data and technology, The Pensions Regulator

      December 6, 2025

      Edinburgh Airport grounds flights due to IT issue affecting air traffic control provider

      December 6, 2025

      Cloudflare fixes second outage in a month

      December 6, 2025

      AWS CEO Garman pitches ‘billions of agents’ as enterprise AI future

      December 6, 2025
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Check BMI
    Tech AI Verse
    You are at:Home»Technology»Sitecore CMS exploit chain starts with hardcoded ‘b’ password
    Technology

    Sitecore CMS exploit chain starts with hardcoded ‘b’ password

    TechAiVerseBy TechAiVerseJune 18, 2025No Comments3 Mins Read1 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Sitecore CMS exploit chain starts with hardcoded ‘b’ password
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    Sitecore CMS exploit chain starts with hardcoded ‘b’ password

    A chain of Sitecore Experience Platform (XP) vulnerabilities allows attackers to perform remote code execution (RCE) without authentication to breach and hijack servers.

    Sitecore is a popular enterprise CMS used by businesses to create and manage content across websites and digital media.

    Discovered by watchTowr researchers, the pre-auth RCE chain disclosed today consists of three distinct vulnerabilities. It hinges on the presence of an internal user (sitecoreServicesAPI) with a hardcoded password set to “b”, making it trivial to hijack.

    This built-in user isn’t an admin and has no assigned roles. However, the researchers could still use it to authenticate via an alternate login path (/sitecore/admin) due to Sitecore’s backend-only login checks being bypassed in non-core database contexts.

    The result is a valid “.AspNet.Cookies” session, granting the attacker authenticated access to internal endpoints protected by IIS-level authorization but not Sitecore role checks.

    With this initial foothold secured, attackers can exploit the second vulnerability, a Zip Slip flaw in Sitecore’s Upload Wizard.

    As watchTowr explains, a ZIP file uploaded via the wizard can contain a malicious file path like //../webshell.aspx. Due to insufficient path sanitization and the way Sitecore maps paths, this results in writing arbitrary files into the webroot, even without knowledge of the full system path.

    This enables the attacker to upload a webshell and execute remote code.

    A third vulnerability becomes exploitable when the Sitecore PowerShell Extensions (SPE) module is installed (commonly bundled with SXA).

    This flaw allows an attacker to upload arbitrary files to attacker-specified paths, bypassing extension or location restrictions entirely and providing a simpler route to reliable RCE.

    Impact and risk

    The three vulnerabilities reported by watchTowr affect Sitecore XP versions 10.1 through 10.4.

    WatchTowr’s scans show over 22,000 publicly exposed Sitecore instances, highlighting a significant attack surface, though not all are necessarily vulnerable.

    Patches addressing the issues were made available in May 2025, but the CVE IDs and technical details were embargoed until June 17, 2025, to give customers time to update.

    “Sitecore is deployed across thousands of environments, including banks, airlines, and global enterprises — so the blast radius here is massive,” commented watchTowr CEO Benjamin Harris to BleepingComputer.

    “And no, this isn’t theoretical: we’ve run the full chain, end-to-end. If you’re running Sitecore, it doesn’t get worse than this – rotate creds and patch immediately before attackers inevitably reverse engineer the fix.”

    As of writing, there is no public evidence of exploitation in the wild.

    However, watchTowr’s technical blog contains enough detail to build a fully working exploit, so the risk of real-world abuse is imminent.

    Why IT teams are ditching manual patch management

    Patching used to mean complex scripts, long hours, and endless fire drills. Not anymore.

    In this new guide, Tines breaks down how modern IT orgs are leveling up with automation. Patch faster, reduce overhead, and focus on strategic work — no complex scripts required.

    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous Article10 DeWalt Tools You Should Buy Brushless
    Next Article New Veeam RCE flaw lets domain users hack backup servers
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    Cyber teams on alert as React2Shell exploitation spreads

    December 6, 2025

    Interview: Paul Neville, director of digital, data and technology, The Pensions Regulator

    December 6, 2025

    Edinburgh Airport grounds flights due to IT issue affecting air traffic control provider

    December 6, 2025
    Leave A Reply Cancel Reply

    Top Posts

    Ping, You’ve Got Whale: AI detection system alerts ships of whales in their path

    April 22, 2025481 Views

    Lumo vs. Duck AI: Which AI is Better for Your Privacy?

    July 31, 2025163 Views

    6.7 Cummins Lifter Failure: What Years Are Affected (And Possible Fixes)

    April 14, 202586 Views

    Is Libby Compatible With Kobo E-Readers?

    March 31, 202563 Views
    Don't Miss
    Technology December 6, 2025

    Cyber teams on alert as React2Shell exploitation spreads

    Cyber teams on alert as React2Shell exploitation spreads Skórzewiak – stock.adobe.com Exploitation of an RCE…

    Interview: Paul Neville, director of digital, data and technology, The Pensions Regulator

    Edinburgh Airport grounds flights due to IT issue affecting air traffic control provider

    Cloudflare fixes second outage in a month

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    Cyber teams on alert as React2Shell exploitation spreads

    December 6, 20252 Views

    Interview: Paul Neville, director of digital, data and technology, The Pensions Regulator

    December 6, 20252 Views

    Edinburgh Airport grounds flights due to IT issue affecting air traffic control provider

    December 6, 20252 Views
    Most Popular

    Apple thinks people won’t use MagSafe on iPhone 16e

    March 12, 20250 Views

    Volkswagen’s cheapest EV ever is the first to use Rivian software

    March 12, 20250 Views

    Startup studio Hexa acquires majority stake in Veevart, a vertical SaaS platform for museums

    March 12, 20250 Views
    © 2025 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.