Post-Authentication Remote Code Execution (Optional): If attackers gain administrative access through other means (e.g., exploiting authentication bypass vulnerabilities like CVE-2025-2746), they can modify allowed file extensions and upload server-side executable files, such as .aspx, enabling full remote code execution. While it enforces a whitelist of file extensions, it permits SVG files, which can contain embedded JavaScript code. Kentico’s custom file handler processes ZIP files, allowing attackers to extract and execute malicious SVG files stored within. This vulnerability poses severe risks, including unauthorized access to sensitive data, session hijacking, and complete server compromise through remote code execution. Crafting Malicious Files: Attackers create an SVG file containing JavaScript payloads and package it into a ZIP archive.
This Cyber News was published on cybersecuritynews.com. Publication date: Tue, 01 Apr 2025 15:10:05 +0000