CVE-2025-49147

Umbraco.Cms Vulnerable to Disclosure of Configured Password Requirements

Description

Umbraco, a free and open source .NET content management system, has a vulnerability in versions 10.0.0 through 10.8.10 and 13.0.0 through 13.9.1. Via a request to an anonymously authenticated endpoint it's possible to retrieve information about the configured password requirements. The information available is limited but would perhaps give some additional detail useful for someone attempting to brute force derive a user's password. This information was not exposed in Umbraco 7 or 8, nor in 14 or higher versions. The vulnerability is patched in versions 10.8.11 and 13.9.2.

Category

5.3
CVSS
Severity: Medium
CVSS 3.1 •
EPSS 0.03%
Affected: umbraco Umbraco-CMS
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2025-49147?
CVE-2025-49147 has been scored as a medium severity vulnerability.
How to fix CVE-2025-49147?
To fix CVE-2025-49147, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2025-49147 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2025-49147 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2025-49147?
CVE-2025-49147 affects umbraco Umbraco-CMS.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.