Description
Kentico CMS before 13.0.66 has an Insecure Direct Object Reference vulnerability. It allows an attacker with user management rights (default is Administrator) to export the user options of any user, even ones with higher privileges (like Global Administrators) than the current user. The exported XML contains every option of the exported user (even the hashed password).
References (2)
Core 2
Core References
Release Notes, Vendor Advisory x_refsource_misc
https://devnet.kentico.com/download/hotfixes
Exploit, Third Party Advisory x_refsource_misc
https://www.offensity.com/en/blog/authenticated-insecure-direct-object-reference-in-kentico-cms-cve-outstanding/
Scores
CVSS v3
4.9
EPSS
0.0027
EPSS Percentile
50.2%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
Details
CWE
CWE-639
Status
published
Products (1)
kentico/xperience
< 13.0.66
Published
Apr 16, 2022
Tracked Since
Feb 18, 2026