Codegarden

Don’t miss Umbraco’s event of the year

Get your ticket →

Umbraco CMS Security Advisory, March 10, 2026

Security Patches for Umbraco 16 and 17 are now available

Andy Butland
Written by Andy Butland

Three moderate to high vulnerabilities have been found and fixed in Umbraco version 16 and 17. Today, we have released patches for the affected versions and recommend upgrading. Projects hosted on Umbraco Cloud will receive the fix automatically.

Who’s affected?

Versions affected:

  • Umbraco 16.0.0 - 16.5.0

  • Umbraco 17.0.0 - 17.2.1

Unsupported versions can be subject to the vulnerability, but will not receive a patch. We recommend upgrading to a supported major version.

How to fix the vulnerability

A patch is available for the latest minor versions of Umbraco 16 and 17. As we are looking at a patch upgrade, and the fix is straightforward, we expect the update to only require minimal effort per project.

Instructions on patch availability and how to upgrade can be found in the release notes for Umbraco 16.5.1 and Umbraco 17.2.1.

Automatic fix on Umbraco Cloud

All Umbraco Cloud sites running the latest minor version of a supported version are patched via the automated patch feature. The security patches will be rolled out to Umbraco Cloud today to ensure all sites have been fixed.

If a project is not running the latest minor version (16.5.x, 17.2.x), the patch can be applied using the minor upgrade feature.

Screenshot form the Umbraco Cloud Portal showing the option to turn on Automatic Minor Upgrades

ℹ️ Note that Umbraco Cloud also supports automated minor upgrades. This can be enabled on a per-project level and ensures you're always ready to receive the latest patch.

What we know about the vulnerabilities

1. Vertical Privilege Escalation via Missing Authorization Checks

An insufficiently authorized endpoint in the management API allows a user to elevate the privileges of themselves or another user by assigning them to additional user groups.

We have evaluated this as a high vulnerability, though it is significantly mitigated in practice by the fact that the user's account must already have access to the "Users" section, giving them permission to update user details. In most Umbraco setups, such users are already part of the "Administrators" group (and, until relatively recently, had to be).

You can read more in the published security advisory.

2. XSS Vulnerability With Property Descriptions

An authenticated backoffice user with access to manage content types can inject malicious HTML via Umbraco backoffice tags into property type descriptions. Due to an overly permissive attribute check, event handler attributes such as onclick and onload were not filtered.

We evaluate this as moderate and again note the mitigation that the attack can only be carried out by a user already been given or having obtained access to an account with permission to the "Settings" section.

You can read more in the published security advisory.

3. Backoffice API Allows Unauthorized Modification of Domain Data

A backoffice API endpoint allows authenticated users to assign domain-related data to content nodes without proper authorization checks.

The issue is caused by insufficient authorization enforcement on the affected API endpoint, whereby via an API call, domains can be set on content nodes that the editor does not have permission to access (either via user group privileges or start nodes).

You can read more in the published security advisory.

Credit

We'd like to thank Sho Odagiri at GMO Cybersecurity by Ierae, Inc. for reporting the issues and responsible disclosure of details regarding the vulnerability.

Any questions?

If you have any questions or comments about this advisory, make sure to get in touch with us directly on the Security Advisories. Alternatively, you can reach out to the dedicated security email address listed at https://umbraco.com/security. Here you can also find information on how we handle security-related issues.

For direct communication related to security in Umbraco products, please sign up for the dedicated security mailing list.