<?xml version="1.0" encoding="utf-8"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<atom:link href="https://devnet.kentico.com/rss/kx13-security" rel="self" type="application/rss+xml"/>
<title><![CDATA[Kentico Xperience 13 - Security Patches]]></title>
<link><![CDATA[https://devnet.kentico.com/rss/kx13-security]]></link>
<description><![CDATA[A full list of published Kentico Xperience 13 security patches]]></description>
<language><![CDATA[en-US]]></language>
<item>
  <guid isPermaLink="false">f244bcdd-cc84-4212-b5b1-dfb056c2afba</guid>
  <title><![CDATA['picomatch' updated to v2.3.2]]></title>
  <summary><![CDATA[Fixed in 13.0.204]]></summary>
  <description><![CDATA[The hotfix updates the 'picomatch' package used by Page and Form builder client scripts to version '2.3.2'. The updates address security vulnerabilities from previous versions.]]></description>
  <pubDate>Wed, 01 Apr 2026 22:00:00 GMT</pubDate>
  <link><![CDATA[https://devnet.kentico.com/download/hotfixes]]></link>
  <category term="severity:Important" />
</item><item>
  <guid isPermaLink="false">545386ba-c659-49cd-9425-7c0da8c4e98c</guid>
  <title><![CDATA['MimeKit' update to v4.15.1]]></title>
  <summary><![CDATA[Fixed in 13.0.203]]></summary>
  <description><![CDATA[The hotfix updates the 'MimeKit' NuGet package dependency to version '4.15.1' to address security vulnerabilities from previous versions. As a result of the update, the 'MailKit' NuGet package dependency was also updated to  '4.15.1'.]]></description>
  <pubDate>Wed, 25 Mar 2026 23:00:00 GMT</pubDate>
  <link><![CDATA[https://devnet.kentico.com/download/hotfixes]]></link>
  <category term="severity:Moderate" />
</item><item>
  <guid isPermaLink="false">152a3fa1-f220-4820-9240-2c37b0011d7a</guid>
  <title><![CDATA['HtmlSanitizer' updated to 9.0.892]]></title>
  <summary><![CDATA[Fixed in 13.0.202]]></summary>
  <description><![CDATA[The hotfix updates the 'HtmlSanitizer' NuGet package dependency to version '9.0.892'. The update addresses security vulnerabilities from previous versions.]]></description>
  <pubDate>Wed, 18 Feb 2026 23:00:00 GMT</pubDate>
  <link><![CDATA[https://devnet.kentico.com/download/hotfixes]]></link>
  <category term="severity:Moderate" />
</item><item>
  <guid isPermaLink="false">344c908e-a9ef-4201-a61d-6b6cd65ed245</guid>
  <title><![CDATA['axios' updated to 1.13.5]]></title>
  <summary><![CDATA[Fixed in 13.0.201]]></summary>
  <description><![CDATA[The hotfix updates the 'axios' package used by Page and Form builder client scripts to version '1.13.5'. The updates address security vulnerabilities from previous versions.]]></description>
  <pubDate>Wed, 11 Feb 2026 23:00:00 GMT</pubDate>
  <link><![CDATA[https://devnet.kentico.com/download/hotfixes]]></link>
  <category term="severity:Important" />
</item><item>
  <guid isPermaLink="false">33281bd0-0aeb-4e66-88d5-620eb020ef77</guid>
  <title><![CDATA['lodash' and 'lodash-es' updated to 4.17.23]]></title>
  <summary><![CDATA[Fixed in 13.0.201]]></summary>
  <description><![CDATA[The hotfix updates the 'lodash' and 'lodash-es' packages used by Page and Form builder client scripts to version '4.17.23'. The updates address security vulnerabilities from previous versions.]]></description>
  <pubDate>Wed, 11 Feb 2026 23:00:00 GMT</pubDate>
  <link><![CDATA[https://devnet.kentico.com/download/hotfixes]]></link>
  <category term="severity:Moderate" />
</item><item>
  <guid isPermaLink="false">f9ab8118-d42b-4b19-99c4-905e58402e5b</guid>
  <title><![CDATA['diff' updated to 4.0.4]]></title>
  <summary><![CDATA[Fixed in 13.0.201]]></summary>
  <description><![CDATA[The hotfix updates the 'diff' package used by Page and Form builder client scripts to version '4.0.4'. The updates address security vulnerabilities from previous versions.]]></description>
  <pubDate>Wed, 11 Feb 2026 23:00:00 GMT</pubDate>
  <link><![CDATA[https://devnet.kentico.com/download/hotfixes]]></link>
  <category term="severity:Informative" />
</item><item>
  <guid isPermaLink="false">9971a0a7-1323-4fe8-9700-c5be19541a56</guid>
  <title><![CDATA['qs' updated to 6.14.1]]></title>
  <summary><![CDATA[Fixed in 13.0.199]]></summary>
  <description><![CDATA[The 'qs' transitive dependency used by 'Page builder' and 'Form builder' client scripts was updated to version 6.14.1, which addresses security vulnerabilities from previous versions.]]></description>
  <pubDate>Wed, 07 Jan 2026 23:00:00 GMT</pubDate>
  <link><![CDATA[https://devnet.kentico.com/download/hotfixes]]></link>
  <category term="severity:Moderate" />
</item><item>
  <guid isPermaLink="false">bb199a4a-1f23-48d5-889f-58a21ee24ccf</guid>
  <title><![CDATA[ 'express' updated to 4.22.0]]></title>
  <summary><![CDATA[Fixed in 13.0.198]]></summary>
  <description><![CDATA[The 'express' transitive dependency of 'Page builder' and 'Form builder' client scripts was updated to version 4.22.0, which addresses security vulnerabilities from previous versions.]]></description>
  <pubDate>Wed, 10 Dec 2025 23:00:00 GMT</pubDate>
  <link><![CDATA[https://devnet.kentico.com/download/hotfixes]]></link>
  <category term="severity:Informative" />
</item><item>
  <guid isPermaLink="false">ff3487b1-8081-4b64-8ce9-f4ab9c363a1a</guid>
  <title><![CDATA[ 'node-forge' updated to 1.3.2]]></title>
  <summary><![CDATA[Fixed in 13.0.198]]></summary>
  <description><![CDATA[The 'node-forge' transitive dependency of 'Page builder' and 'Form builder' client scripts was updated to version 1.3.2, which addresses security vulnerabilities from previous versions.]]></description>
  <pubDate>Wed, 10 Dec 2025 23:00:00 GMT</pubDate>
  <link><![CDATA[https://devnet.kentico.com/download/hotfixes]]></link>
  <category term="severity:Important" />
</item><item>
  <guid isPermaLink="false">02a7dabe-e754-40f2-8c84-3de68ad046c8</guid>
  <title><![CDATA['microsoft.codedom.providers.dotnetcompilerplatform' update to v4.1.0]]></title>
  <summary><![CDATA[Fixed in 13.0.195]]></summary>
  <description><![CDATA[The hotfix updates the 'microsoft.codedom.providers.dotnetcompilerplatform' package to version 4.1.0, which addresses security vulnerabilities in the previous version.]]></description>
  <pubDate>Wed, 15 Oct 2025 22:00:00 GMT</pubDate>
  <link><![CDATA[https://devnet.kentico.com/download/hotfixes]]></link>
  <category term="severity:Important" />
</item><item>
  <guid isPermaLink="false">6c8c413a-b337-424c-852a-2245712c43f5</guid>
  <title><![CDATA['axios' update to v1.12.2]]></title>
  <summary><![CDATA[Fixed in 13.0.193]]></summary>
  <description><![CDATA[The hotfix updates the 'axios' third-party dependency used by the Page Builder feature to version 1.12.2, which addresses security vulnerabilities in the previous version.]]></description>
  <pubDate>Wed, 17 Sep 2025 22:00:00 GMT</pubDate>
  <link><![CDATA[https://devnet.kentico.com/download/hotfixes]]></link>
  <category term="severity:Moderate" />
</item><item>
  <guid isPermaLink="false">b9b91798-aea1-4ca3-a3ac-31d5b1c6465a</guid>
  <title><![CDATA[Last sign-in not tracked for external users ]]></title>
  <summary><![CDATA[Fixed in 13.0.191]]></summary>
  <description><![CDATA[The system did not update the 'Last sign-in' value for users that signed-in to the administration UI via external authentication.]]></description>
  <pubDate>Wed, 27 Aug 2025 22:00:00 GMT</pubDate>
  <link><![CDATA[https://devnet.kentico.com/download/hotfixes]]></link>
  <category term="severity:Moderate" />
</item><item>
  <guid isPermaLink="false">13d065f9-e988-4fb6-82df-fe910797dc4c</guid>
  <title><![CDATA['form-data' update to 4.0.4]]></title>
  <summary><![CDATA[Fixed in 13.0.189]]></summary>
  <description><![CDATA[<p>The hotfix updates the &#39;form-data&#39; third-party library to version 4.0.4, which addresses security vulnerabilities in the previous version.</p>
]]></description>
  <pubDate>Sat, 26 Jul 2025 22:00:00 GMT</pubDate>
  <link><![CDATA[https://devnet.kentico.com/download/hotfixes]]></link>
  <category term="severity:Important" />
</item><item>
  <guid isPermaLink="false">4eb1ee73-4d25-45cc-8793-3701b0930138</guid>
  <title><![CDATA['on-headers' update to 1.1.0]]></title>
  <summary><![CDATA[Fixed in 13.0.189]]></summary>
  <description><![CDATA[The hotfix updates the 'on-headers' third-party library to version 1.1.0, which addresses security vulnerabilities in the previous version.]]></description>
  <pubDate>Sat, 26 Jul 2025 22:00:00 GMT</pubDate>
  <link><![CDATA[https://devnet.kentico.com/download/hotfixes]]></link>
  <category term="severity:Informative" />
</item><item>
  <guid isPermaLink="false">e7c584f0-4b24-4b66-b970-7f82c367eb77</guid>
  <title><![CDATA['brace-expansion' dependency update]]></title>
  <summary><![CDATA[Fixed in 13.0.188]]></summary>
  <description><![CDATA[The hotfix updates the 'brace-expansion' library used by Page and Form Builder scripts to version 1.1.12 to address security vulnerabilities.]]></description>
  <pubDate>Wed, 18 Jun 2025 22:00:00 GMT</pubDate>
  <link><![CDATA[https://devnet.kentico.com/download/hotfixes]]></link>
  <category term="severity:Informative" />
</item><item>
  <guid isPermaLink="false">098cc005-73d1-42eb-be15-d595d028edd4</guid>
  <title><![CDATA[AngularJS library update to 1.8.3]]></title>
  <summary><![CDATA[Fixed in 13.0.185]]></summary>
  <description><![CDATA[<p>The hotfix updates the AngularJS library used in certain parts of the administration interface to version 1.8.3. This addresses security vulnerabilities in the original 1.5.5 version.</p>
]]></description>
  <pubDate>Tue, 06 May 2025 22:00:00 GMT</pubDate>
  <link><![CDATA[https://devnet.kentico.com/download/hotfixes]]></link>
  <category term="severity:Important" />
</item><item>
  <guid isPermaLink="false">0b47cd76-3ede-4808-af93-535453ec58c1</guid>
  <title><![CDATA[http-proxy-middleware update to 2.0.9]]></title>
  <summary><![CDATA[Fixed in 13.0.184]]></summary>
  <description><![CDATA[The hotfix updates the http-proxy-middleware used by the administration interface to version 2.0.9, which addresses security vulnerabilities in the previous version.]]></description>
  <pubDate>Tue, 29 Apr 2025 22:00:00 GMT</pubDate>
  <link><![CDATA[https://devnet.kentico.com/download/hotfixes]]></link>
  <category term="severity:Moderate" />
</item><item>
  <guid isPermaLink="false">bab43a7b-b794-4401-bc1f-0aa6286791df</guid>
  <title><![CDATA[MooTools library made obsolete]]></title>
  <summary><![CDATA[Fixed in 13.0.182]]></summary>
  <description><![CDATA[The hotfix obsoletes the outdated MooTools library bundled with the administration project to improve security, due to potential vulnerabilities. The library, located under ~/CMSScripts/mootools.js, was carried over from previous versions of Kentico Xperience and is not used by any default functionality in Kentico Xperience 13. If your custom code depends on any features from this library, we recommend referencing an external implementation.]]></description>
  <pubDate>Wed, 09 Apr 2025 22:00:00 GMT</pubDate>
  <link><![CDATA[https://devnet.kentico.com/download/hotfixes]]></link>
  <category term="severity:Important" />
</item><item>
  <guid isPermaLink="false">3c751a2a-dc49-400d-abc6-ddbe3288cde1</guid>
  <title><![CDATA[Require.js library update to v2.3.7]]></title>
  <summary><![CDATA[Fixed in 13.0.182]]></summary>
  <description><![CDATA[The Require.js library contained a vulnerability with high severity: Prototype pollution. The hotfix addresses this security vulnerability by updating the library to version 2.3.7. ]]></description>
  <pubDate>Wed, 09 Apr 2025 22:00:00 GMT</pubDate>
  <link><![CDATA[https://devnet.kentico.com/download/hotfixes]]></link>
  <category term="severity:Important" />
</item><item>
  <guid isPermaLink="false">0325ae3c-09f7-4f46-889e-bb5fcd42c889</guid>
  <title><![CDATA[Underscore.js library update to v1.13.7]]></title>
  <summary><![CDATA[Fixed in 13.0.181]]></summary>
  <description><![CDATA[<p>The Underscore.js library was vulnerable to Arbitrary Code Injection via the template function. The hotfix addresses this security vulnerability by updating the library to version 1.13.7.</p>
]]></description>
  <pubDate>Wed, 02 Apr 2025 22:00:00 GMT</pubDate>
  <link><![CDATA[https://devnet.kentico.com/download/hotfixes]]></link>
  <category term="severity:Important" />
</item><item>
  <guid isPermaLink="false">64a8ee27-e530-44ae-880e-48b204fe0b30</guid>
  <title><![CDATA[Stored XSS via media library upload]]></title>
  <summary><![CDATA[Fixed in 13.0.181]]></summary>
  <description><![CDATA[As an authenticated user, it was possible to distribute a malicious payload by abusing media library file upload and following certain specific steps. ]]></description>
  <pubDate>Wed, 02 Apr 2025 22:00:00 GMT</pubDate>
  <link><![CDATA[https://devnet.kentico.com/download/hotfixes]]></link>
  <category term="severity:Moderate" />
</item><item>
  <guid isPermaLink="false">d1cb9d8d-b823-437e-aca6-50b57f9816dd</guid>
  <title><![CDATA[Froala editor update to v4.5.0]]></title>
  <summary><![CDATA[Fixed in 13.0.181]]></summary>
  <description><![CDATA[The hotfix updates the Froala WYSIWYG editor used in the 'Rich text' page builder widget to version 4.5.0, which addresses security vulnerabilities in the previous version.]]></description>
  <pubDate>Wed, 02 Apr 2025 22:00:00 GMT</pubDate>
  <link><![CDATA[https://devnet.kentico.com/download/hotfixes]]></link>
  <category term="severity:Moderate" />
</item><item>
  <guid isPermaLink="false">0effbbb5-a653-4ff7-9994-d65d291aba32</guid>
  <title><![CDATA[Denial of service using Content staging]]></title>
  <summary><![CDATA[Fixed in 13.0.180]]></summary>
  <description><![CDATA[It was possible to launch a denial-of-service attack by exploiting the system's Content staging feature. Staging did not need to be enabled, the vulnerability was exploitable under all circumstances. Applying the hotfix results in a functional breaking change in the Content staging feature. See the hotfix instructions in the documentation for details and potential manual steps required after hotfixing your instance.]]></description>
  <pubDate>Thu, 27 Mar 2025 23:00:00 GMT</pubDate>
  <link><![CDATA[https://devnet.kentico.com/download/hotfixes]]></link>
  <category term="severity:Important" />
</item><item>
  <guid isPermaLink="false">eb1aa0ed-5d56-4094-90a2-2b99174f268b</guid>
  <title><![CDATA[Update of third-party dependencies]]></title>
  <summary><![CDATA[Fixed in 13.0.179]]></summary>
  <description><![CDATA[The hotfix updates several third-party dependencies of page and form builder scripts to newer versions that address vulnerabilities.]]></description>
  <pubDate>Wed, 19 Mar 2025 23:00:00 GMT</pubDate>
  <link><![CDATA[https://devnet.kentico.com/download/hotfixes]]></link>
  <category term="severity:Important" />
</item><item>
  <guid isPermaLink="false">3704924c-bff3-4ceb-8324-ee0791ac572f</guid>
  <title><![CDATA[Self-XSS in the database installation step]]></title>
  <summary><![CDATA[Fixed in 13.0.179]]></summary>
  <description><![CDATA[It was possible to perform a Self-Cross Site Scripting attack when progressing through the 'additional database installation' wizard in the administration project.]]></description>
  <pubDate>Wed, 19 Mar 2025 23:00:00 GMT</pubDate>
  <link><![CDATA[https://devnet.kentico.com/download/hotfixes]]></link>
  <category term="severity:Informative" />
</item><item>
  <guid isPermaLink="false">b1857dea-229c-4269-b0d6-8856956e8907</guid>
  <title><![CDATA[SQL injection in product installer]]></title>
  <summary><![CDATA[Fixed in 13.0.178]]></summary>
  <description><![CDATA[The product database installer was vulnerable to an SQL injection attack during the installation process. To fix the issue, the hotfix must be applied to the Setup files (switch to advanced mode in the hotfix utility) as well as your instance (database installation can be triggered multiple ways).]]></description>
  <pubDate>Wed, 05 Mar 2025 23:00:00 GMT</pubDate>
  <link><![CDATA[https://devnet.kentico.com/download/hotfixes]]></link>
  <category term="severity:Moderate" />
</item><item>
  <guid isPermaLink="false">dd41076d-fd04-4b51-a205-f1a65bf4039b</guid>
  <title><![CDATA[Stored XSS when uploading files]]></title>
  <summary><![CDATA[Fixed in 13.0.178]]></summary>
  <description><![CDATA[It was possible to distribute a malicious payload as an unauthenticated user when uploading multiple files to the application. A similar vulnerability could have also been exploited by authenticated users. Applying the hotfix introduces functional changes to the application's file retrieval endpoint for certain types of files. See the hotfix instructions for details.]]></description>
  <pubDate>Wed, 05 Mar 2025 23:00:00 GMT</pubDate>
  <link><![CDATA[https://devnet.kentico.com/download/hotfixes]]></link>
  <category term="severity:Moderate" />
</item><item>
  <guid isPermaLink="false">4aa96064-a27b-41ea-88a2-a566d434d581</guid>
  <title><![CDATA[Authorization bypass in content staging]]></title>
  <summary><![CDATA[Fixed in 13.0.178]]></summary>
  <description><![CDATA[<p>Due to a vulnerability in a third-party library used by the product, the staging authentication mechanism could be bypassed. Only instances with the staging functionality enabled were affected. This vulnerability exploited a different attack vector from the one fixed in hotfix 13.0.173. See the hotfix instructions in the documentation for possible manual steps required after hotfixing your instance. If you don&#39;t use staging and want to completely mitigate all possible vulnerabilities, you can limit which external services can access the staging endpoint &lsquo;/CMSPages/Staging/SyncServer.asmx&rsquo; by editing the &#39;&lt;location path=&quot;Staging/SyncServer.asmx&quot;&gt;<location path="Staging/SyncServer.asmx">&#39; node in the config file under &#39;/CMS/CMSPages/Web.config&#39;. To deny access to all users, set &#39;authorization&#39; to &#39;&lt;deny users=&quot;*&quot; /&gt;<deny users="*">&#39;.</deny></location></p>

<p><strong>CVE record:</strong> <a href="https://www.cve.org/CVERecord?id=CVE-2025-2747" target="_blank">CVE-2025-2747</a></p>
]]></description>
  <pubDate>Wed, 05 Mar 2025 23:00:00 GMT</pubDate>
  <link><![CDATA[https://devnet.kentico.com/download/hotfixes]]></link>
  <category term="severity:Critical" />
</item><item>
  <guid isPermaLink="false">61d6ba70-8808-4ac6-bbfa-64e0d8702a98</guid>
  <title><![CDATA[Post-auth remote code execution]]></title>
  <summary><![CDATA[Fixed in 13.0.178]]></summary>
  <description><![CDATA[Staging media files could lead to Remote Code Execution on the target server.]]></description>
  <pubDate>Wed, 05 Mar 2025 23:00:00 GMT</pubDate>
  <link><![CDATA[https://devnet.kentico.com/download/hotfixes]]></link>
  <category term="severity:Important" />
</item><item>
  <guid isPermaLink="false">fd9c813c-223e-45ab-95ce-2d7db1e54333</guid>
  <title><![CDATA[Updated Lodash to the latest version]]></title>
  <summary><![CDATA[Fixed in 13.0.177]]></summary>
  <description><![CDATA[The Lodash JavaScript library used in the administration interface was updated to version 4.17.21 due to security vulnerabilities contained in the previously used version.]]></description>
  <pubDate>Wed, 26 Feb 2025 23:00:00 GMT</pubDate>
  <link><![CDATA[https://devnet.kentico.com/download/hotfixes]]></link>
  <category term="severity:Important" />
</item><item>
  <guid isPermaLink="false">16ecf3e8-5429-4dda-afd2-eb3abd0616ae</guid>
  <title><![CDATA[Authorization bypass in the staging service]]></title>
  <summary><![CDATA[Fixed in 13.0.173]]></summary>
  <description><![CDATA[<p>An issue in the staging endpoint allowed attackers to bypass authorization using forged requests. This attack can be misused to gain complete control over the Xperience instance. We strongly recommend applying this hotfix as soon as possible. This issue affects instances with enabled staging using username and password authentication. As a temporary workaround, administrators can either disable staging on target servers or use X.509 authentication, which is not vulnerable, and limit which external services can access the &lsquo;/CMSPages/Staging/SyncServer.asmx&rsquo; endpoint.</p>

<p><strong>CVE record:</strong> <a href="https://www.cve.org/CVERecord?id=CVE-2025-2746" target="_blank">CVE-2025-2746</a></p>
]]></description>
  <pubDate>Wed, 29 Jan 2025 23:00:00 GMT</pubDate>
  <link><![CDATA[https://devnet.kentico.com/download/hotfixes]]></link>
  <category term="severity:Critical" />
</item><item>
  <guid isPermaLink="false">c88915ce-2d29-41c3-9cea-53c834c0a9c3</guid>
  <title><![CDATA[Update of third-party dependencies]]></title>
  <summary><![CDATA[Fixed in 13.0.171]]></summary>
  <description><![CDATA[The hotfix updates System.Text.RegularExpressions, System.Net.Http, and several third-party dependencies of page and form builder scripts to newer versions that address vulnerabilities.]]></description>
  <pubDate>Wed, 15 Jan 2025 23:00:00 GMT</pubDate>
  <link><![CDATA[https://devnet.kentico.com/download/hotfixes]]></link>
  <category term="severity:Important" />
</item><item>
  <guid isPermaLink="false">d2fe7f51-5328-4c7b-acf9-a0a10ff5e4a0</guid>
  <title><![CDATA[CKEditor update to v4.25.0]]></title>
  <summary><![CDATA[Fixed in 13.0.170]]></summary>
  <description><![CDATA[<p>The hotfix updates the WYSIWYG editor used by the administration interface to version 4.25.0, which addresses security vulnerabilities in the previous version.</p>
]]></description>
  <pubDate>Wed, 08 Jan 2025 23:00:00 GMT</pubDate>
  <link><![CDATA[https://devnet.kentico.com/download/hotfixes]]></link>
  <category term="severity:Informative" />
</item><item>
  <guid isPermaLink="false">3b8fe53b-2fec-4e40-8add-a244fe147255</guid>
  <title><![CDATA[Update of third-party dependencies]]></title>
  <summary><![CDATA[Fixed in 13.0.168]]></summary>
  <description><![CDATA[The hotfix updates several third-party dependencies of page and form builder scripts to newer versions that address vulnerabilities.
]]></description>
  <pubDate>Wed, 27 Nov 2024 23:00:00 GMT</pubDate>
  <link><![CDATA[https://devnet.kentico.com/download/hotfixes]]></link>
  <category term="severity:Important" />
</item><item>
  <guid isPermaLink="false">113a02ea-f7bd-4f76-91f2-98b729f0f597</guid>
  <title><![CDATA[Users unable to set 'secure' flag for administration cookies via web.config]]></title>
  <summary><![CDATA[Fixed in 13.0.165]]></summary>
  <description><![CDATA[The 'requireSSL' attribute on the 'httpCookies' web.config element was not reflected when setting cookies via 'CookieHelper.SetValue'. Instead, SSL was always disabled unless explicitly forced via the optional 'secure' parameter of the 'SetValue' method. The hotfix introduces a number of functional changes to the 'SetValue' method to correct this issue. Only .NET Framework projects are affected. See the hotfix instructions in the documentation for details.]]></description>
  <pubDate>Wed, 09 Oct 2024 22:00:00 GMT</pubDate>
  <link><![CDATA[https://devnet.kentico.com/download/hotfixes]]></link>
  <category term="severity:Moderate" />
</item><item>
  <guid isPermaLink="false">2a261b22-a7a4-49f0-8e48-9abe495eba79</guid>
  <title><![CDATA[Stored XSS in the Rich text editor component]]></title>
  <summary><![CDATA[Fixed in 13.0.163]]></summary>
  <description><![CDATA[The rich text editor component for the page and form builder was vulnerable to cross-site scripting attacks (XSS). To eliminate this vulnerability, entered URIs are validated and can contain only allowed schemes.]]></description>
  <pubDate>Wed, 11 Sep 2024 22:00:00 GMT</pubDate>
  <link><![CDATA[https://devnet.kentico.com/download/hotfixes]]></link>
  <category term="severity:Important" />
</item><item>
  <guid isPermaLink="false">460d9e8e-0a8d-45c0-b45f-b219acd4ed5b</guid>
  <title><![CDATA[Reflected XSS in the Pages dashboard widget]]></title>
  <summary><![CDATA[Fixed in 13.0.161]]></summary>
  <description><![CDATA[The configuration dialog of the ‘Pages’ administration dashboard widget was vulnerable to reflected cross-site scripting attacks. To eliminate this vulnerability, all configuration values are now properly encoded.]]></description>
  <pubDate>Wed, 28 Aug 2024 22:00:00 GMT</pubDate>
  <link><![CDATA[https://devnet.kentico.com/download/hotfixes]]></link>
  <category term="severity:Moderate" />
</item><item>
  <guid isPermaLink="false">b81b8ecc-86fe-4e4b-83ad-5763d821fc4e</guid>
  <title><![CDATA[Allowed admin hostnames disclosed via public endpoint]]></title>
  <summary><![CDATA[Fixed in 13.0.160]]></summary>
  <description><![CDATA[The list of allowed administration interface hostnames sent during authentication was disclosed to public users. After applying the hotfix, hostnames are no longer accessible.]]></description>
  <pubDate>Wed, 21 Aug 2024 22:00:00 GMT</pubDate>
  <link><![CDATA[https://devnet.kentico.com/download/hotfixes]]></link>
  <category term="severity:Moderate" />
</item><item>
  <guid isPermaLink="false">61b00ebf-19b1-4a7d-b209-0d9d30bceb9b</guid>
  <title><![CDATA[Stored XSS in Form validation]]></title>
  <summary><![CDATA[Fixed in 13.0.160]]></summary>
  <description><![CDATA[Form validation rule configuration was vulnerable to stored Cross-Site-Scripting attacks. To eliminate this vulnerability, validation message is now properly encoded.]]></description>
  <pubDate>Wed, 21 Aug 2024 22:00:00 GMT</pubDate>
  <link><![CDATA[https://devnet.kentico.com/download/hotfixes]]></link>
  <category term="severity:Important" />
</item><item>
  <guid isPermaLink="false">136d4b37-1a4c-4c39-ab83-7357929fe8c8</guid>
  <title><![CDATA[Stored XSS in shipping options configuration]]></title>
  <summary><![CDATA[Fixed in 13.0.160]]></summary>
  <description><![CDATA[This vulnerability was caused by the ability to enter malicious code into the configuration of shipping options. This could lead to cross-site scripting attacks resulting in potential theft of sensitive data. To correct this issue, support for HTML markup in the shipping options configured was removed.]]></description>
  <pubDate>Wed, 21 Aug 2024 22:00:00 GMT</pubDate>
  <link><![CDATA[https://devnet.kentico.com/download/hotfixes]]></link>
  <category term="severity:Moderate" />
</item><item>
  <guid isPermaLink="false">4e7d7884-7841-4eb1-b639-ceb840a7745b</guid>
  <title><![CDATA[Stored XSS in Checkbox form component]]></title>
  <summary><![CDATA[Fixed in 13.0.159]]></summary>
  <description><![CDATA[<p>The Checkbox component in form builder was vulnerable to Cross-Site-Scripting attack (XSS). To eliminate this vulnerability, support for HTML in Checkbox component was removed.</p>
]]></description>
  <pubDate>Wed, 14 Aug 2024 22:00:00 GMT</pubDate>
  <link><![CDATA[https://devnet.kentico.com/download/hotfixes]]></link>
  <category term="severity:Moderate" />
</item><item>
  <guid isPermaLink="false">1d48f425-bce2-4036-8607-c469a6ace706</guid>
  <title><![CDATA[Stored XSS in avatar upload feature]]></title>
  <summary><![CDATA[Fixed in 13.0.159]]></summary>
  <description><![CDATA[<p>This vulnerability was caused by the file uploader that did not check the configuration of allowed extensions which could potentially lead to Cross-Site-Scripting attack (XSS). We fixed this issue by adding a check for extension of uploaded file, which effectively eliminated possibility of XSS.</p>
]]></description>
  <pubDate>Wed, 14 Aug 2024 22:00:00 GMT</pubDate>
  <link><![CDATA[https://devnet.kentico.com/download/hotfixes]]></link>
  <category term="severity:Moderate" />
</item><item>
  <guid isPermaLink="false">3177f4b9-7b3d-4f0c-9857-3bee9de7597b</guid>
  <title><![CDATA['System.Security.Cryptography.Pkcs' NuGet package update]]></title>
  <summary><![CDATA[Fixed in 13.0.153]]></summary>
  <description><![CDATA[The hotfix updates the 'System.Security.Cryptography.Pkcs' NuGet package dependency to version 8.0.0.]]></description>
  <pubDate>Wed, 19 Jun 2024 22:00:00 GMT</pubDate>
  <link><![CDATA[https://devnet.kentico.com/download/hotfixes]]></link>
  <category term="severity:Important" />
</item><item>
  <guid isPermaLink="false">e89c8f08-3e68-46f7-bc6e-53db1a3d5f40</guid>
  <title><![CDATA[Reflected XSS in the administration interface]]></title>
  <summary><![CDATA[Fixed in 13.0.121]]></summary>
  <description><![CDATA[A certain page in the administration interface was vulnerable to reflected XSS attacks. The vulnerability could only be exploited by authenticated users.
]]></description>
  <pubDate>Wed, 23 Aug 2023 22:00:00 GMT</pubDate>
  <link><![CDATA[https://devnet.kentico.com/download/hotfixes]]></link>
  <category term="severity:Moderate" />
</item><item>
  <guid isPermaLink="false">d887a9af-d5ae-48db-9273-346bafd1721a</guid>
  <title><![CDATA[Stored XSS in the Localization application]]></title>
  <summary><![CDATA[Fixed in 13.0.112]]></summary>
  <description><![CDATA[It was possible to inject a malicious payload using the Localization application, which could affect several parts of the administration interface. By default, only users with the Global Administrator privilege could successfully execute the attack.]]></description>
  <pubDate>Wed, 24 May 2023 22:00:00 GMT</pubDate>
  <link><![CDATA[https://devnet.kentico.com/download/hotfixes]]></link>
  <category term="severity:Moderate" />
</item><item>
  <guid isPermaLink="false">c34d3c6b-cdd7-4120-9958-b1e06bfe8544</guid>
  <title><![CDATA[Reflected XSS in preview URLs]]></title>
  <summary><![CDATA[Fixed in 13.0.110]]></summary>
  <description><![CDATA[Page preview URLs were vulnerable to reflected XSS attacks due to improper processing. The vulnerability was exploitable only by authenticated users. ]]></description>
  <pubDate>Wed, 10 May 2023 22:00:00 GMT</pubDate>
  <link><![CDATA[https://devnet.kentico.com/download/hotfixes]]></link>
  <category term="severity:Moderate" />
</item><item>
  <guid isPermaLink="false">5d00fbc1-c4ae-46db-9167-e23d015049cb</guid>
  <title><![CDATA[Update of third-party dependencies]]></title>
  <summary><![CDATA[Fixed in 13.0.110]]></summary>
  <description><![CDATA[The hotfix updates several third-party dependencies used by the system to later versions. See the hotfix instructions for the full list.]]></description>
  <pubDate>Wed, 10 May 2023 22:00:00 GMT</pubDate>
  <link><![CDATA[https://devnet.kentico.com/download/hotfixes]]></link>
  <category term="severity:Important" />
</item><item>
  <guid isPermaLink="false">04d31f21-ddcd-40d1-a653-83140099ebcc</guid>
  <title><![CDATA[Information disclosure after a failed file upload]]></title>
  <summary><![CDATA[Fixed in 13.0.99]]></summary>
  <description><![CDATA[When specific conditions were met, and the server could not save an uploaded file (e.g., attachment, media library file), the displayed error message might have contained the filesystem path. After applying the hotfix, only a generic error message is displayed to the user. The full error with detailed information is logged to the event log.]]></description>
  <pubDate>Wed, 25 Jan 2023 23:00:00 GMT</pubDate>
  <link><![CDATA[https://devnet.kentico.com/download/hotfixes]]></link>
  <category term="severity:Informative" />
</item><item>
  <guid isPermaLink="false">2a2867de-606f-4f9a-b352-23dfb3a0060d</guid>
  <title><![CDATA[Stored XSS in 'Localization' application]]></title>
  <summary><![CDATA[Fixed in 13.0.99]]></summary>
  <description><![CDATA[The listing of resource strings in the ‘Localization’ application was vulnerable to stored XSS attacks.]]></description>
  <pubDate>Wed, 25 Jan 2023 23:00:00 GMT</pubDate>
  <link><![CDATA[https://devnet.kentico.com/download/hotfixes]]></link>
  <category term="severity:Moderate" />
</item><item>
  <guid isPermaLink="false">96ed021a-d248-45b7-a57a-84016d6f17c6</guid>
  <title><![CDATA[Update of System.Data.SqlClient library]]></title>
  <summary><![CDATA[Fixed in 13.0.98]]></summary>
  <description><![CDATA[Due to an information disclosure issue in the 'System.Data.SqlClient' library ([https://github.com/advisories/GHSA-8g2p-5pqh-5jmc),|https://github.com/advisories/GHSA-8g2p-5pqh-5jmc),|smart-link]  this dependency in the product was updated to version 4.8.5.

The 'System.Security.Permissions' and 'System.Security.AccessControl' NuGet packages are no longer needed by the CMSApp project, and we recommend uninstalling them from the project if no custom code depends on them.]]></description>
  <pubDate>Wed, 18 Jan 2023 23:00:00 GMT</pubDate>
  <link><![CDATA[https://devnet.kentico.com/download/hotfixes]]></link>
  <category term="severity:Moderate" />
</item><item>
  <guid isPermaLink="false">772d09ff-f933-4eb5-a743-7a0e7a64d4f1</guid>
  <title><![CDATA[Stored XSS through email templates]]></title>
  <summary><![CDATA[Fixed in 13.0.93]]></summary>
  <description><![CDATA[Administration users were able to inject stored XSS via email marketing templates.]]></description>
  <pubDate>Tue, 06 Dec 2022 23:00:00 GMT</pubDate>
  <link><![CDATA[https://devnet.kentico.com/download/hotfixes]]></link>
  <category term="severity:Moderate" />
</item><item>
  <guid isPermaLink="false">e5fdeafe-2477-4d2a-8388-556d330ad0b6</guid>
  <title><![CDATA[Reflected XSS in the Rich text editor component]]></title>
  <summary><![CDATA[Fixed in 13.0.89]]></summary>
  <description><![CDATA[<p>Administration input fields using the Rich text editor component were vulnerable to reflected XSS attacks.</p>
]]></description>
  <pubDate>Thu, 03 Nov 2022 23:00:00 GMT</pubDate>
  <link><![CDATA[https://devnet.kentico.com/download/hotfixes]]></link>
  <category term="severity:Moderate" />
</item><item>
  <guid isPermaLink="false">4a652524-2818-492e-a744-1e12ff48e1ef</guid>
  <title><![CDATA[CRLF Injection on page redirection]]></title>
  <summary><![CDATA[Fixed in 13.0.80]]></summary>
  <description><![CDATA[The routing engine was vulnerable to CRLF Injection when performing redirects due to improper encoding of the URL query string.]]></description>
  <pubDate>Thu, 01 Sep 2022 22:00:00 GMT</pubDate>
  <link><![CDATA[https://devnet.kentico.com/download/hotfixes]]></link>
  <category term="severity:Moderate" />
</item><item>
  <guid isPermaLink="false">a99cec7a-6ceb-4e3b-a157-87bce8e96ddf</guid>
  <title><![CDATA[Cross-site scripting via form configuration]]></title>
  <summary><![CDATA[Fixed in 13.0.75]]></summary>
  <description><![CDATA[The ‘After the form is submitted > Redirect to URL' configuration for forms in the Xperience administration didn’t properly validate input. This could lead to cross-site scripting attacks.]]></description>
  <pubDate>Thu, 23 Jun 2022 22:00:00 GMT</pubDate>
  <link><![CDATA[https://devnet.kentico.com/download/hotfixes]]></link>
  <category term="severity:Moderate" />
</item><item>
  <guid isPermaLink="false">3a0f9a9a-cae9-4e90-9d8c-364e972011d1</guid>
  <title><![CDATA[HTML injection in Form emails]]></title>
  <summary><![CDATA[Fixed in 13.0.72]]></summary>
  <description><![CDATA[When a user submitted a form on the live site with a malicious HTML value, the form’s notification and autoresponder emails didn’t encode these values. That could lead to potential HTML injection if the recipient’s email client was configured to display HTML content. The hotfix introduces a new ‘CMSBizFormMailEncodeFields’ configuration key, which you can add to the project’s appsettings.json or web.config file. If set to true, autoresponder and notification emails encode the values of the submitted form’s fields. Add the key to both your live site and administration projects.]]></description>
  <pubDate>Wed, 01 Jun 2022 22:00:00 GMT</pubDate>
  <link><![CDATA[https://devnet.kentico.com/download/hotfixes]]></link>
  <category term="severity:Moderate" />
</item><item>
  <guid isPermaLink="false">bf119db7-4445-4685-b365-4d2bd4dfe4aa</guid>
  <title><![CDATA[Denial of service caused by improper input validation]]></title>
  <summary><![CDATA[Fixed in 13.0.66]]></summary>
  <description><![CDATA[<p>A specially crafted request sent to the GetResource handler may have been used to launch a denial-of-service attack. The vulnerability was fixed via input validation.</p>
]]></description>
  <pubDate>Thu, 07 Apr 2022 22:00:00 GMT</pubDate>
  <link><![CDATA[https://devnet.kentico.com/download/hotfixes]]></link>
  <category term="severity:Important" />
</item><item>
  <guid isPermaLink="false">4242aa5c-7245-4673-9370-c91e055e8f08</guid>
  <title><![CDATA[Administrators able to export Global administrator users]]></title>
  <summary><![CDATA[Fixed in 13.0.66]]></summary>
  <description><![CDATA[Users with the 'Administrator' privilege level were able to send requests that exported data about other users with the higher 'Global administrator' privilege level (this was not possible directly in the user interface). The export may have contained all user data stored in the database.]]></description>
  <pubDate>Thu, 07 Apr 2022 22:00:00 GMT</pubDate>
  <link><![CDATA[https://devnet.kentico.com/download/hotfixes]]></link>
  <category term="severity:Moderate" />
</item><item>
  <guid isPermaLink="false">6ebe1b00-1bd1-45f6-9aaa-04ad8d764a03</guid>
  <title><![CDATA[Cross-site scripting via file upload]]></title>
  <summary><![CDATA[Fixed in 13.0.57]]></summary>
  <description><![CDATA[<p>Stored cross-site scripting could occur if a user uploaded a malicious XML file as a page attachment or metafile.</p>
]]></description>
  <pubDate>Thu, 06 Jan 2022 23:00:00 GMT</pubDate>
  <link><![CDATA[https://devnet.kentico.com/download/hotfixes]]></link>
  <category term="severity:Important" />
</item><item>
  <guid isPermaLink="false">7232f1b7-1fb8-4730-ab81-fdf5af312cb2</guid>
  <title><![CDATA[Cross-site scripting via file upload in media libraries]]></title>
  <summary><![CDATA[Fixed in 13.0.55]]></summary>
  <description><![CDATA[Stored cross-site scripting occurred if a user uploaded a malicious XML file into a media library.]]></description>
  <pubDate>Thu, 09 Dec 2021 23:00:00 GMT</pubDate>
  <link><![CDATA[https://devnet.kentico.com/download/hotfixes]]></link>
  <category term="severity:Important" />
</item><item>
  <guid isPermaLink="false">4e58cc08-0035-4091-ac07-414168993aed</guid>
  <title><![CDATA[SQL injection in certain macros]]></title>
  <summary><![CDATA[Fixed in 13.0.53]]></summary>
  <description><![CDATA[Certain online marketing macro methods contained an SQL injection vulnerability that could be abused by authenticated editors in the administration interface. Adding a malicious SQL query as a macro method parameter could allow unauthorized access to data or modifications in the database.]]></description>
  <pubDate>Thu, 25 Nov 2021 23:00:00 GMT</pubDate>
  <link><![CDATA[https://devnet.kentico.com/download/hotfixes]]></link>
  <category term="severity:Critical" />
</item><item>
  <guid isPermaLink="false">7392582f-fc82-4e67-84fe-dc6799fe9de9</guid>
  <title><![CDATA[Flawed MIME type validation for uploaded files]]></title>
  <summary><![CDATA[Fixed in 13.0.44]]></summary>
  <description><![CDATA[<p>Certain locations within the system allowed uploading of files with a spoofed Content-Type that did not match the file extension, which could lead to XSS vulnerability.</p>
]]></description>
  <pubDate>Thu, 16 Sep 2021 22:00:00 GMT</pubDate>
  <link><![CDATA[https://devnet.kentico.com/download/hotfixes]]></link>
  <category term="severity:Important" />
</item><item>
  <guid isPermaLink="false">ee757182-7359-4d69-8a7c-f4695e1918b6</guid>
  <title><![CDATA[Self Cross-site scripting when submitting forms]]></title>
  <summary><![CDATA[Fixed in 13.0.27]]></summary>
  <description><![CDATA[A cross-site scripting vulnerability was present when submitting form data using the Form widget or on the Recorded data tab in the administration. Only the users submitting the form were affected by this vulnerability, therefore it is classified as self-XSS.]]></description>
  <pubDate>Thu, 27 May 2021 22:00:00 GMT</pubDate>
  <link><![CDATA[https://devnet.kentico.com/download/hotfixes]]></link>
  <category term="severity:Informative" />
</item></channel>
</rss>
