CVE-2019-10068

📊 9.8 CRITICAL94.1%🎯 0 exploits🏛️ KEV Listed
📅 Published Mar 26, 2019
📋 Status: Modified

An issue was discovered in Kentico 12.0.x before 12.0.15, 11.0.x before 11.0.48, 10.0.x before 10.0.52, and 9.x versions. Due to a failure to validate security headers, it was possible for a specially crafted request to the staging service to bypass the initial authentication and proceed to deserialize user-controlled .NET object input. This deserialization then led to unauthenticated remote code execution on the server where the Kentico instance was hosted.

🎯 Affected Products & Systems

4 product configurations affected

Filter by type:
📱
Application
Vulnerable
Version: ≥ 9.0.0 ∧ ≤ 9.0.51
CPE:
cpe:2.3:a:kentico:kentico:*:*:*:*:*:*:*:*
📱
Application
Vulnerable
Version: ≥ 10.0.0 ∧ < 10.0.52
CPE:
cpe:2.3:a:kentico:kentico:*:*:*:*:*:*:*:*
📱
Application
Vulnerable
Version: ≥ 11.0.0 ∧ < 11.0.48
CPE:
cpe:2.3:a:kentico:kentico:*:*:*:*:*:*:*:*
📱
Application
Vulnerable
Version: ≥ 12.0.0 ∧ < 12.0.15
CPE:
cpe:2.3:a:kentico:kentico:*:*:*:*:*:*:*:*
Metrics
9.8 CRITICALCVSS v3.1[email protected]
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector:
NETWORK
Complexity:
LOW
Privileges:
NONE
User Interaction:
NONE
Confidentiality:
HIGH
Integrity:
HIGH
Availability:
HIGH
Scope:
UNCHANGED

🔍 Technical Details

Analysis Status
Modified
CVSS Details
9.8 (CRITICAL)v3.1
EPSS Details
94.1% (Critical)99.9th percentile
Last updated: Oct 31, 2025
Exploitation probability within 30 days
Published Date
Mar 26, 2019 (6 years ago)
Last Modified
Oct 22, 2025 (11 days ago)
Security Weaknesses2
References3