
Three new security vulnerabilities have been disclosed in the Sitecore Experience Platform that could be exploited to achieve information disclosure and remote code execution.
The flaws, per watchTowr Labs, are listed below –
- CVE-2025-53693 – HTML cache poisoning through unsafe reflections
- CVE-2025-53691 – Remote code execution (RCE) through insecure deserialization
- CVE-2025-53694 – Information Disclosure in ItemService API with a restricted anonymous user, leading to exposure of cache keys using a brute-force approach
Patches for the first two shortcomings were released by Sitecore in June and for the third in July 2025, with the company stating that “successful exploitation of the related vulnerabilities might lead to remote code execution and non-authorized access to information.”

The findings build on three more flaws in the same product that were detailed by watchTowr back in June –
- CVE-2025-34509 (CVSS score: 8.2) – Use of hard-coded credentials
- CVE-2025-34510 (CVSS score: 8.8) – Post-authenticated remote code execution via path traversal
- CVE-2025-34511 (CVSS score: 8.8) – Post-authenticated remote code execution via Sitecore PowerShell Extension
watchTowr Labs researcher Piotr Bazydlo said the newly uncovered bugs could be fashioned into an exploit chain by bringing together the pre-auth HTML cache poisoning vulnerability with a post-authenticated remote code execution issue to compromise a fully-patched Sitecore Experience Platform instance.
The entire sequence of events leading up to code execution is as follows: A threat actor could leverage the ItemService API, if exposed, to trivially enumerate HTML cache keys stored in the Sitecore cache and send HTTP cache poisoning requests to those keys.
This could then be chained with CVE-2025-53691 to supply malicious HTML code that ultimately results in code execution by means of an unrestricted BinaryFormatter call.
“We managed to abuse a very restricted reflection path to call a method that lets us poison any HTML cache key,” Bazydlo said. “That single primitive opened the door to hijacking Sitecore Experience Platform pages – and from there, dropping arbitrary JavaScript to trigger a Post-Auth RCE vulnerability.”