// For flags

CVE-2021-43991

Persistent XSS via Avatar Upload in Kentico Xperience CMS

Severity Score

5.4
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The Kentico Xperience CMS version 13.0 – 13.0.43 is vulnerable to a persistent Cross-Site Scripting (XSS) vulnerability (also known as Stored or Second-Order XSS). Persistent XSS vulnerabilities occur when the application stores and retrieves client supplied data without proper handling of dangerous content. This type of XSS vulnerability is exploited by submitting malicious script content to the application which is then retrieved and executed by other application users. The attacker could exploit this to conduct a range of attacks against users of the affected application such as session hijacking, account take over and accessing sensitive data.

Kentico Xperience CMS versión 13.0 - 13.0.43, es vulnerable a una vulnerabilidad de tipo Cross-Site Scripting (XSS) persistente (también se conoce como Stored o Second-Order XSS). Las vulnerabilidades de tipo XSS persistentes se producen cuando la aplicación almacena y recupera los datos suministrados por el cliente sin administrar apropiadamente el contenido peligroso. Este tipo de vulnerabilidad de tipo XSS es explotada al enviar contenido de script malicioso a la aplicación que luego es recuperado y ejecutado por otros usuarios de la aplicación. El atacante podría aprovechar esto para realizar una serie de ataques contra usuarios de la aplicación afectada, como el secuestro de la sesión, la toma de la cuenta y el acceso a datos confidenciales

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
Required
Scope
Changed
Confidentiality
High
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Medium
Authentication
Single
Confidentiality
None
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2021-11-17 CVE Reserved
  • 2021-12-03 CVE Published
  • 2024-08-04 CVE Updated
  • 2024-08-04 First Exploit
  • 2025-03-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
References (1)
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Kentico
Search vendor "Kentico"
Xperience
Search vendor "Kentico" for product "Xperience"
>= 13.0.0 <= 13.0.43
Search vendor "Kentico" for product "Xperience" and version " >= 13.0.0 <= 13.0.43"
-
Affected