CVE-2025-1968

7.7 HIGH

📋 TL;DR

This vulnerability allows attackers to reuse expired session IDs in Progress Sitefinity under specific circumstances, enabling session replay attacks. This affects Sitefinity versions 14.0 through 14.3, 14.4 before 8145, 15.0 before 8231, 15.1 before 8332, and 15.2 before 8429.

💻 Affected Systems

Products:
  • Progress Software Corporation Sitefinity
Versions: 14.0 through 14.3, 14.4 before 14.4.8145, 15.0 before 15.0.8231, 15.1 before 15.1.8332, 15.2 before 15.2.8429
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability occurs under specific and uncommon circumstances as per vendor description.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could hijack authenticated user sessions, gaining unauthorized access to administrative functions, sensitive data, or performing actions as legitimate users.

🟠

Likely Case

Session hijacking leading to unauthorized access to user accounts and potential data exposure.

🟢

If Mitigated

Limited impact with proper session management controls and monitoring in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires specific conditions and session access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 14.4.8145, 15.0.8231, 15.1.8332, 15.2.8429

Vendor Advisory: https://community.progress.com/s/article/Sitefinity-Security-Advisory-for-Addressing-Security-Vulnerability-CVE-2025-1968-April-2025

Restart Required: Yes

Instructions:

1. Identify your Sitefinity version. 2. Download appropriate patch from Progress support portal. 3. Apply patch following vendor instructions. 4. Restart application services. 5. Verify patch installation.

🔧 Temporary Workarounds

Session Timeout Reduction

all

Reduce session timeout values to minimize window for session replay attacks.

Modify web.config: <sessionState timeout="15" />

IP Binding

all

Bind sessions to client IP addresses to prevent session reuse from different locations.

Implement custom session validation checking client IP matches session IP

🧯 If You Can't Patch

  • Implement strict session management with short timeouts and forced re-authentication for sensitive operations.
  • Deploy WAF rules to detect and block session replay patterns and monitor for abnormal session activity.

🔍 How to Verify

Check if Vulnerable:

Check Sitefinity version in administration panel or web.config file against affected version ranges.

Check Version:

Check Sitefinity administration dashboard or examine web.config for version information.

Verify Fix Applied:

Verify installed version matches patched versions: 14.4.8145, 15.0.8231, 15.1.8332, or 15.2.8429.

📡 Detection & Monitoring

Log Indicators:

  • Multiple session creations from same user in short time
  • Session IDs being reused after expiration
  • Authentication attempts with expired session tokens

Network Indicators:

  • Repeated authentication requests with same credentials
  • Session cookie reuse patterns

SIEM Query:

source="sitefinity" AND (event="session_reuse" OR event="multiple_sessions" OR status="expired_session_active")

🔗 References

📤 Share & Export