Brenden,
I think we are circling around the same word "stable" but meaning different things by it. Let me clarify, because I see two separate concepts here:
- Stable website: I meant stable from the business owner and editor perspective. No outages, editors manage content without issues, the site serves the business needs. The client is satisfied.
- Stable CMS: This is what you are talking about, and I fully agree with you. Kentico 8-12 is not stable from a security and platform perspective. Unpatched CVEs, outdated dependencies, end-of-support. All valid concerns. And yes, "could" should read "when." I agree with that too.
My post and my question are about what we can practically do for sites that are stable in sense #1 but running on a CMS that is not stable in sense #2. That gap between "the client sees no problem" and "we as professionals see real risk" is exactly the situation I am trying to address.
As Sean mentioned, it is common for low digital maturity clients to not see the business case for migration. And while we would all love to move them to Xperience by Kentico, the reality is that for a small brochure site with a few contact forms, there is often no reasonable license tier that fits their budget and needs. The technology is there, but the commercial path is not.
So what do we do in the meantime? Just tell them to migrate and walk away if they say no?
I have done some research on this. Based on the Wappalyzer database, I identified over 6,000 sites flagged as running on Kentico across all versions. After filtering I found out approximately 2,500 are still running Kentico 8-12. That includes around 50 government sites. These are not edge cases. This is a significant portion of the Kentico ecosystem that needs practical guidance.
What I found when I dug into the dependency chain is that the infrastructure underneath these sites is or potentially could be actually more durable than most people assume:
- .NET Framework 4.8 ships as a Windows component. Its lifecycle is tied to the OS, not to a standalone end-of-life date. It will be supported as long as Windows Server exists through Server 2025 that means at least until 2034.
- SQL Server 2025 is supported until 2036.
- TLS 1.2/1.3, browser rendering, and the web standards these sites output are not going away.
So the runtime is not the thing that kills these sites. What kills them is exposed attack surface on the application layer -- exactly what you are pointing out. The known CVEs, the staging service (CVE-2019-10068, CVE-2025-2746), publicly accessible admin endpoints, unused features left enabled.
But here is the thing: most of that attack surface can be systematically reduced without migrating. Based on my analysis, a typical brochure site on Kentico 8-12 that only uses content pages, media libraries, and basic contact forms (BizForms) has a very small attack surface if you:
- Lock down /CMSPages/, /CMSModules/, /Admin/, and the staging service to VPN or known IPs only. This single step neutralizes the majority of known Kentico CVEs.
- Apply the final hotfix for the version.
- If the client does not use content staging, disable it in Kentico Settings and block /CMSPages/SyncServer.asmx at the IIS or firewall level. If the client does use staging, IP-restrict the SyncServer.asmx endpoint so only the known staging server can reach it. This neutralizes the public-facing CVE risk while preserving the workflow.
- Disable unused features in Kentico Settings to reduce attack surface.
- Put a WAF and CDN in front of the site (even Cloudflare free tier). A WAF with the OWASP Core Rule Set catches deserialization and injection patterns.
- Upgrade the underlying infrastructure -- Windows Server 2022/2025, SQL Server 2022, .NET Framework 4.8.1.
- Force HTTPS, set security headers, add CAPTCHA to forms.
The features that are genuinely dangerous on unsupported Kentico - e-commerce, public user accounts, marketing automation -- those are features you should migrate away from, no question. But a content-driven brochure site with forms and an IP-restricted admin? The attack surface after hardening is minimal.
I have built a decision framework around this that categorizes every Kentico feature by actual attack surface: what is safe to keep, what needs hardening, and what is a non-negotiable reason to migrate. Migration becomes non-negotiable when:
- The site handles PII under regulatory scrutiny (GDPR data processing, not just cookies)
- There is e-commerce or payment processing (PCI-DSS on unsupported software is not viable)
- Public user accounts exist (the authentication stack is too critical)
- A new critical CVE is discovered with no available patch and no compensating control
For the rest -- and that is the majority of those ~2,500 sites -- there is a responsible, structured way to extend their useful life while we wait for the client to see the business case for migration. Harden now, refresh the front-end to solve the problems the client actually cares about (design, performance, SEO), and plan to evaluate the platform when the next redesign cycle comes around in 4-5 years.
I am not arguing that these sites should stay on Kentico 8-12 forever. I am arguing that "migrate or accept the risk" is a false binary when there is a concrete third option: reduce the risk systematically and be ready when the client is ready.