CVE-2019-25137

7.2 HIGH

📋 TL;DR

This vulnerability allows authenticated administrators in Umbraco CMS to execute arbitrary code remotely via XSLT processing. Attackers can inject malicious scripts through the xsltVisualize.aspx page, leading to full system compromise. Only administrators with access to the developer tools are affected.

💻 Affected Systems

Products:
  • Umbraco CMS
Versions: 4.11.8 through 7.15.10, and 7.12.4
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Requires administrator access to developer/Xslt/xsltVisualize.aspx page

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining complete control over the server, data exfiltration, lateral movement, and persistent backdoor installation.

🟠

Likely Case

Authenticated administrator or compromised admin account executes arbitrary code to steal data, modify content, or establish foothold for further attacks.

🟢

If Mitigated

Limited impact due to proper access controls, monitoring, and network segmentation preventing lateral movement.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ✅ No
Complexity: LOW

Multiple public exploits available, requires authenticated admin access

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 7.15.10 and 8.0+

Vendor Advisory: https://umbraco.com/blog/security-advisory-2019-10-28/

Restart Required: No

Instructions:

1. Upgrade to Umbraco 8.0 or later 2. Apply security patches for 7.x versions 3. Update via NuGet package manager or manual installation

🔧 Temporary Workarounds

Restrict Developer Access

all

Remove or restrict access to developer/Xslt/xsltVisualize.aspx page

Remove or rename xsltVisualize.aspx file
Add IP restrictions to developer directory

Disable XSLT Script Execution

windows

Configure application to disable msxsl:script execution

Modify web.config to restrict XSLT settings

🧯 If You Can't Patch

  • Implement strict access controls for admin accounts with MFA
  • Monitor and alert on access to xsltVisualize.aspx page

🔍 How to Verify

Check if Vulnerable:

Check Umbraco version in web.config or admin panel against affected versions

Check Version:

Check Umbraco.Core.dll version or admin dashboard

Verify Fix Applied:

Verify version is 8.0+ or patched 7.x version, test xsltVisualize.aspx access

📡 Detection & Monitoring

Log Indicators:

  • Access to /developer/Xslt/xsltVisualize.aspx
  • Unusual process creation from w3wp.exe or dotnet

Network Indicators:

  • POST requests to xsltVisualize.aspx with msxsl:script content
  • Outbound connections from web server to unknown IPs

SIEM Query:

source="web_logs" AND uri="/developer/Xslt/xsltVisualize.aspx" AND status=200

🔗 References

📤 Share & Export