Miggo Logo

CVE-2025-46736: Umbraco Makes User Enumeration Feasible Based on Timing of Login Response

5.3

CVSS Score
3.1

Basic Information

EPSS Score
0.10763%
Published
5/6/2025
Updated
5/6/2025
KEV Status
No
Technology
TechnologyC#

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
Umbraco.Cmsnuget>= 11.0.0-rc1, < 13.8.113.8.1
Umbraco.Cmsnuget< 10.8.1010.8.10

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability allows user enumeration based on the timing of login responses. The provided patches (14fbd20665b453cbf094ccf4575b79a9fba07e03 and 34709be6cce9752dfa767dffbf551305f48839bc) clearly show modifications to the PostLogin method within the AuthenticationController.cs file. These changes involve adding a TimedScope to ensure that failed login attempts take a consistent amount of time, thereby preventing attackers from distinguishing between valid and invalid users based on response time. The PostLogin method is directly responsible for processing login requests and its response timing was the source of the vulnerability. The new GetLoginDuration method and the TimedScope class are part of the mitigation, not the vulnerability itself. The core vulnerable behavior was within PostLogin before these mitigations were applied.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t **s** on *n *n*lysis o* t** timin* o* post lo*in *PI r*spons*s, it's possi*l* to **t*rmin* w**t**r *n ***ount *xists. ### P*t***s P*t**** in **.*.** *n* **.*.*. ### Work*roun*s Non* *v*il**l*.

Reasoning

T** vuln*r**ility *llows us*r *num*r*tion **s** on t** timin* o* lo*in r*spons*s. T** provi*** p*t***s (**************************************** *n* ****************************************) *l**rly s*ow mo*i*i**tions to t** `PostLo*in` m*t*o* wit*in