What is Kentico Xperience?
Kentico Xperience is a .NET-based digital experience platform (DXP) and content management system (CMS) used by organizations to build and manage websites, e-commerce portals, and digital marketing campaigns. It is popular in enterprise, higher education, healthcare, and government sectors. The platform includes a Staging Sync Server feature that allows content to be synchronized between Kentico environments (e.g., staging to production), which is the component affected by this vulnerability.
Because Kentico Xperience installations typically run as ASP.NET applications on Windows IIS servers and handle content publication workflows, a compromise gives attackers the ability to execute arbitrary code within the web application's context — effectively owning the web server.
Overview
CVE-2025-2749 is an authenticated path traversal and arbitrary file upload vulnerability in the Staging Sync Server component of Kentico Xperience. An authenticated attacker — one who holds valid Staging Sync Server credentials — can upload arbitrary files to path-relative locations outside the intended upload directory. If the attacker uploads an ASP.NET script (e.g., a .aspx webshell) to a web-accessible directory, it will be executed server-side by IIS, resulting in full remote code execution (RCE) within the application's context.
Affected Versions
| Status | Kentico Xperience Version |
|---|---|
| Vulnerable | All versions through 13.0.178 |
| Fixed | Versions after 13.0.178 (hotfix) |
The vulnerability was reported by VulnCheck and affects the entire Kentico Xperience 13 branch up to and including build 13.0.178.
Technical Details
The Staging Sync Server in Kentico Xperience is a component designed to transfer content and configuration between Kentico environments. It exposes a file upload interface used during the synchronization process.
The flaw lies in insufficient validation of file paths during upload. The Staging Sync Server does not properly restrict the target path of uploaded files to a safe, designated directory. By manipulating path parameters with relative traversal sequences (e.g., ../../), an authenticated attacker can direct uploaded file content to arbitrary locations on the server's filesystem.
Attack chain to RCE:
- Attacker authenticates to the Staging Sync Server with valid credentials
- Attacker crafts a file upload request with a path-traversal sequence targeting a web-accessible directory (e.g., the site root or a known public folder)
- Attacker uploads a malicious ASP.NET webshell (e.g.,
shell.aspx) to that directory - Attacker accesses the uploaded file via HTTP, triggering IIS to execute the ASP.NET code
- Attacker has arbitrary command execution on the web server
Attack characteristics:
- Authentication required: Yes — valid Staging Sync Server credentials
- Attack complexity: Low (once credentials are obtained)
- Network-accessible: Yes
- User interaction: None
- Potential impact: Full RCE, data theft, malware deployment, persistent access
Although authentication is required, organizations that use Staging Sync Server may expose it to a broader set of users (e.g., content editors, staging administrators) than the primary CMS admin panel. Phishing or credential stuffing can satisfy the authentication requirement.
Discovery
CVE-2025-2749 was discovered and reported by VulnCheck, which submitted the CVE to NVD on March 24, 2025. The vulnerability was confirmed as actively exploited in the wild at or shortly after the time of disclosure.
Exploitation Context
CISA confirmed active exploitation of CVE-2025-2749 when adding it to the KEV catalog on April 20, 2026. SecurityWeek reported that the flaw had been exploited in real-world attacks against Kentico Xperience installations, with threat actors using it alongside other recently exploited vulnerabilities in enterprise software (Cisco SD-WAN, Zimbra ZCS) added to KEV in the same batch.
The primary exploitation path involves uploading ASP.NET webshells to gain persistent remote code execution on the underlying Windows server. From there, attackers typically move to credential harvesting, lateral movement, and data exfiltration.
Remediation
- Apply the Kentico hotfix — upgrade Kentico Xperience to a version beyond 13.0.178. Download hotfixes from devnet.kentico.com/download/hotfixes.
- If immediate patching is not possible, restrict network access to the Staging Sync Server endpoint to only trusted administrative IP addresses via firewall or IIS IP restrictions.
- Audit and minimize Staging Sync Server accounts — apply the principle of least privilege, ensuring only accounts that genuinely require this feature have access.
- Scan web-accessible directories for unexpected
.aspx,.ashx, or other script files that could be webshells uploaded by attackers. - Review IIS access logs for unusual POST requests to the Staging Sync Server endpoint, particularly those with path traversal sequences (
../,%2e%2e%2f). - Check for signs of lateral movement from the web server to internal systems — credential theft tools, unusual PowerShell execution, or new local/domain accounts.
Key Details
| Property | Value |
|---|---|
| CVE ID | CVE-2025-2749 |
| Vendor / Product | Kentico — Kentico Xperience |
| NVD Published | 2025-03-24 |
| NVD Last Modified | 2026-04-21 |
| CVSS 3.1 Score | 7.2 |
| CVSS 3.1 Vector | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
| Severity | HIGH |
| CWE | CWE-22 — Path Traversal (Unrestricted File Upload) |
| CISA KEV Added | 2026-04-20 |
| CISA KEV Deadline | 2026-05-04 |
| Known Ransomware Use | No |
CVSS 3.1 Breakdown
Required Action
Timeline
| Date | Event |
|---|---|
| 2025-03-24 | CVE-2025-2749 published by VulnCheck; Kentico hotfix released for versions beyond 13.0.178 |
| 2025-03-25 | Security advisories circulate; exploitation in the wild reported |
| 2026-04-20 | Added to CISA Known Exploited Vulnerabilities catalog |
| 2026-05-04 | CISA BOD 22-01 remediation deadline |
References
| Resource | Type |
|---|---|
| NVD — CVE-2025-2749 | Vulnerability Database |
| Kentico Hotfix Downloads | Vendor Advisory / Patch |
| SecurityWeek — Organizations Warned of Exploited Cisco, Kentico, Zimbra Vulnerabilities | Press/Media Coverage |
| Kentico Xperience RCE Exploited in the Wild (CVE-2025-2749) | Security Research |
| CISA KEV Catalog Entry | US Government |
| CISA BOD 22-01 | Remediation Directive |
| CWE-22 — Improper Limitation of a Pathname to a Restricted Directory | Weakness Classification |