{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T19:32:20.383","vulnerabilities":[{"cve":{"id":"CVE-2025-2747","sourceIdentifier":"disclosure@vulncheck.com","published":"2025-03-24T19:15:51.967","lastModified":"2025-11-06T13:58:01.850","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"An authentication bypass vulnerability in Kentico Xperience allows authentication bypass via the Staging Sync Server component password handling for the server defined None type. Authentication bypass allows an attacker to control administrative objects.This issue affects Xperience through 13.0.178."},{"lang":"es","value":"Una vulnerabilidad de omisión de autenticación en Kentico Xperience permite omitir la autenticación mediante la gestión de contraseñas del componente Staging Sync Server para el tipo \"Ninguno\" definido por el servidor. Esta omisión permite a un atacante controlar objetos administrativos. Este problema afecta a Xperience hasta la versión 13.0.178."}],"metrics":{"cvssMetricV31":[{"source":"disclosure@vulncheck.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"cisaExploitAdd":"2025-10-20","cisaActionDue":"2025-11-10","cisaRequiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","cisaVulnerabilityName":"Kentico Xperience CMS Authentication Bypass Using an Alternate Path or Channel Vulnerability","weaknesses":[{"source":"disclosure@vulncheck.com","type":"Secondary","description":[{"lang":"en","value":"CWE-288"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:kentico:xperience:*:*:*:*:*:*:*:*","versionEndIncluding":"13.0.178","matchCriteriaId":"BC749CC3-7A20-49C8-89FB-775818670734"}]}]}],"references":[{"url":"https://devnet.kentico.com/download/hotfixes","source":"disclosure@vulncheck.com","tags":["Patch"]},{"url":"https://github.com/watchtowrlabs/kentico-xperience13-AuthBypass-wt-2025-0011","source":"disclosure@vulncheck.com","tags":["Third Party Advisory"]},{"url":"https://labs.watchtowr.com/bypassing-authentication-like-its-the-90s-pre-auth-rce-chain-s-in-kentico-xperience-cms/","source":"disclosure@vulncheck.com","tags":["Exploit","Third Party Advisory"]},{"url":"https://www.vulncheck.com/advisories/kentico-xperience-staging-sync-server-none-password-type-authentication-bypass","source":"disclosure@vulncheck.com","tags":["Third Party Advisory"]},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-2747","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["US Government Resource"]}]}}]}