
We found results for “”
CVE-2025-49147
Good to know:


Date: June 24, 2025
Umbraco, a free and open source .NET content management system, has a vulnerability in versions 10.0.0 through 10.8.10 and 13.0.0 through 13.9.1. Via a request to an anonymously authenticated endpoint it's possible to retrieve information about the configured password requirements. The information available is limited but would perhaps give some additional detail useful for someone attempting to brute force derive a user's password. This information was not exposed in Umbraco 7 or 8, nor in 14 or higher versions. The vulnerability is patched in versions 10.8.11 and 13.9.2.
Severity Score
Related Resources (6)
Severity Score
Weakness Type (CWE)
Exposure of Sensitive System Information to an Unauthorized Control Sphere
CWE-497Top Fix

Upgrade Version
Upgrade to version Umbraco.Cms.Web.BackOffice - 10.8.11;Umbraco.Cms.Web.BackOffice - 13.9.2;Umbraco.Cms.Web.BackOffice - 10.8.11;Umbraco.Cms.Web.BackOffice - 13.9.2;Umbraco.Cms - 10.8.11;Umbraco.Cms - 13.9.2;https://github.com/umbraco/Umbraco-CMS.git - release-10.8.11;https://github.com/umbraco/Umbraco-CMS.git - release-13.9.2
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | LOW |
Privileges Required (PR): | NONE |
User Interaction (UI): | NONE |
Scope (S): | UNCHANGED |
Confidentiality (C): | LOW |
Integrity (I): | NONE |
Availability (A): | NONE |