HTML cache poisoning through unsafe reflections### CVE-2025-53693: HTML Cache Poisoning
The XAML handler, located at `/-/xaml/`, exposes several controls that can be accessed without authentication. The `AjaxScriptManager` within these controls allows for the execution of methods via reflection. The `AddToCache` method can be abused to inject arbitrary HTML content into the Sitecore cache, which can then be rendered in other parts of the application.
**Cache Poisoning:** The attacker uses CVE-2025-53693 to poison the cache with a malicious payload.
## Mitigation
Sitecore has released patches for this vulnerabilitie. It is strongly recommended to upgrade to the latest version of Sitecore XP or apply the provided security patches.
## Reference
[1] Watchtowr Labs. (2025). [*Cache Me If You Can: Sitecore Experience Platform Cache Poisoning to RCE*.](https://labs.watchtowr.com/cache-me-if-you-can-sitecore-experience-platform-cache-poisoning-to-rce/)
[4.0K] /data/pocs/8f25cf7576f0cf41a4567497183dd6429ba98798
├── [ 12K] exploit.py
├── [1.0K] LICENSE
└── [ 918] README.md
0 directories, 3 files