CVE-2022-50685

5.4 MEDIUM

📋 TL;DR

This stored cross-site scripting vulnerability in Kentico Xperience allows authenticated users to upload malicious XML files as page attachments or metafiles, which then execute malicious scripts in other users' browsers when accessed. It affects Kentico Xperience installations with file upload functionality enabled, requiring attacker authentication but posing risk to all users who view the malicious content.

💻 Affected Systems

Products:
  • Kentico Xperience
Versions: Specific versions not detailed in provided references; check vendor advisory for exact affected versions
Operating Systems: Windows, Linux (if running on supported platforms)
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user access and file upload functionality enabled; affects both page attachments and metafile uploads

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal session cookies, perform actions as authenticated users, redirect to malicious sites, or deploy malware to users' systems through browser exploitation.

🟠

Likely Case

Session hijacking, credential theft, or defacement of web pages through injected content affecting users who access the malicious XML files.

🟢

If Mitigated

Limited impact with proper input validation and output encoding, potentially only affecting users with specific browser configurations or extensions.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated user access; attackers need to upload malicious XML files and have victims access them

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Kentico hotfixes for specific version

Vendor Advisory: https://devnet.kentico.com/download/hotfixes

Restart Required: Yes

Instructions:

1. Access Kentico DevNet hotfix portal 2. Download appropriate hotfix for your version 3. Apply hotfix following vendor instructions 4. Restart application/services 5. Verify fix implementation

🔧 Temporary Workarounds

Disable XML file uploads

all

Restrict file uploads to exclude XML file types in Kentico Xperience configuration

Modify web.config or application settings to restrict allowed upload file extensions

Implement input validation

all

Add server-side validation to sanitize XML file content before processing

Implement custom validation handlers for file upload endpoints

🧯 If You Can't Patch

  • Implement web application firewall rules to block malicious XML upload patterns
  • Restrict file upload permissions to trusted users only and monitor upload activities

🔍 How to Verify

Check if Vulnerable:

Test by uploading XML file with script payload as authenticated user and checking if script executes when file is accessed

Check Version:

Check Kentico administration interface or application files for version information

Verify Fix Applied:

Attempt same test after patch application; script should be sanitized or blocked

📡 Detection & Monitoring

Log Indicators:

  • Unusual XML file uploads
  • Multiple failed upload attempts
  • Uploads from unexpected user accounts

Network Indicators:

  • HTTP POST requests with XML file uploads to Kentico endpoints
  • Unusual file size patterns for uploads

SIEM Query:

source="kentico_logs" AND (file_extension=".xml" OR content_type="text/xml") AND action="upload"

🔗 References

📤 Share & Export