<?xml version="1.0" encoding="utf-8"?><feed xmlns="http://www.w3.org/2005/Atom"><title type="text">Blog posts by Phu Nguyen</title><link href="http://world.optimizely.com" /><updated>2025-08-08T10:18:13.0000000Z</updated><id>https://world.optimizely.com/blogs/phu-nguyen/</id> <generator uri="http://world.optimizely.com" version="2.0">Optimizely World</generator> <entry><title>Episerver.CMS 12.33.2 delisted from Nuget feed</title><link href="https://world.optimizely.com/blogs/phu-nguyen/dates/2025/8/notice-delisted-cms-12.33.2-package-due-to-packaging-issue" /><id>&lt;p&gt;We have recently &lt;strong&gt;delisted &lt;/strong&gt;version &lt;strong&gt;12.33.2&lt;/strong&gt; of the &lt;a href=&quot;https://nuget.optimizely.com/packages/episerver.cms&quot;&gt;Episerver.CMS&lt;/a&gt; package due to a packaging issue that may cause compatibility problems in certain scenarios. The DLL version is &lt;strong&gt;1.0.0&lt;/strong&gt; instead of &lt;strong&gt;12.33.2&lt;/strong&gt;. This issue only affects projects that have a direct dependency on the Episerver.CMS DLL, such as Commerce sites or any other library that depends directly on the Episerver.CMS DLL.&lt;/p&gt;
&lt;p&gt;If you&amp;rsquo;re already using CMS 12.33.2 and encounter problems, a possible workaround is to install Episerver.CMS.UI version 12.33.2 directly in your site instead of using Episerver.CMS.&lt;/p&gt;
&lt;p&gt;However, our recommendation is to either:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Revert to version &lt;strong&gt;12.33.1&lt;/strong&gt;, or&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Wait for version &lt;strong&gt;12.33.3&lt;/strong&gt;, which will contain a fix and will be released shortly.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;We apologize for the inconvenience and appreciate your understanding.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Update Aug-11&lt;/strong&gt;: the&amp;nbsp;package Episerver.CMS 12.33.3 is now available on our public feed &lt;a href=&quot;https://nuget.optimizely.com/packages/episerver.cms/12.33.3&quot;&gt;https://nuget.optimizely.com/packages/episerver.cms/12.33.3&lt;/a&gt;&lt;/p&gt;</id><updated>2025-08-08T10:18:13.0000000Z</updated><summary type="html">Blog post</summary></entry> <entry><title>Vulnerability in EPiServer.Forms</title><link href="https://world.optimizely.com/blogs/phu-nguyen/dates/2023/10/vulnerability-in-episerver-forms/" /><id>&lt;p&gt;&lt;strong&gt;Introduction&lt;/strong&gt;&lt;br /&gt;We recently fixed a potential security vulnerability for the Optimizely Forms addon, customers may face this issue with any Forms version, the problem will happen when using a CMS function without noticing its noted behaviors. It could lead to losing security protection for some of the end-users&#39; data.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Risk&lt;/strong&gt;&lt;br /&gt;Overall, the risk of vulnerability is high, especially if your website uses content indexing services (like Find or other search engines).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Mitigation&amp;nbsp;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The issue has been fixed in EPiServer.Forms &lt;a href=&quot;https://nuget.optimizely.com/package/?id=EPiServer.Forms&amp;amp;v=5.7.0&quot;&gt;v5.7.0&lt;/a&gt; (&lt;a href=&quot;/link/1933ba72787346df9003b7a4c7d1cff8.aspx?epsremainingpath=bug/AFORM-3620&quot;&gt;AFORM-3620&lt;/a&gt;)&lt;span class=&quot;TrackChangeTextInsertion TrackedChange SCXW119116340 BCX0&quot;&gt;&lt;span class=&quot;TextRun SCXW119116340 BCX0&quot;&gt;&lt;span class=&quot;NormalTextRun SCXW119116340 BCX0&quot;&gt; for CMS 12 and &lt;a href=&quot;https://nuget.optimizely.com/package/?id=EPiServer.Forms&amp;amp;v=4.31.0&quot;&gt;v4.31.&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;TrackChangeTextInsertion TrackedChange SCXW119116340 BCX0&quot;&gt;&lt;span class=&quot;TextRun SCXW119116340 BCX0&quot;&gt;&lt;span class=&quot;NormalTextRun SCXW119116340 BCX0&quot;&gt;&lt;a href=&quot;https://nuget.optimizely.com/package/?id=EPiServer.Forms&amp;amp;v=4.31.0&quot;&gt;0&lt;/a&gt; for &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;TrackChangeTextInsertion TrackedChange SCXW119116340 BCX0&quot;&gt;&lt;span class=&quot;TextRun SCXW119116340 BCX0&quot;&gt;&lt;span class=&quot;NormalTextRun SCXW119116340 BCX0&quot;&gt;CMS 11&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;TrackChangeTextDeletionMarker TrackedChange SCXW119116340 BCX0&quot;&gt;&lt;span class=&quot;TextRun SCXW119116340 BCX0&quot;&gt;&lt;span class=&quot;NormalTextRun TrackChangeTextDeletion SCXW119116340 BCX0&quot;&gt;. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;TrackChangeTextInsertion TrackedChange SCXW119116340 BCX0&quot;&gt;&lt;span class=&quot;TextRun SCXW119116340 BCX0&quot;&gt;&lt;span class=&quot;NormalTextRun SCXW119116340 BCX0&quot;&gt;Please upgrade to those versions as soon as possible&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;TrackChangeTextInsertion TrackedChange SCXW119116340 BCX0&quot;&gt;&lt;span class=&quot;TextRun SCXW119116340 BCX0&quot;&gt;&lt;span class=&quot;NormalTextRun SCXW119116340 BCX0&quot;&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style=&quot;text-decoration: underline;&quot;&gt;For DXP service customers:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Mitigation is in place for all DXP service customers.&lt;/li&gt;
&lt;li&gt;&lt;em&gt;Update (October 27)&lt;/em&gt;&lt;span&gt;: To clarify, we&lt;/span&gt;&amp;nbsp;have mitigated existing vulnerable vectors, but packages SHOULD&amp;nbsp;be updated to mitigate the risk of reintroducing the vulnerability!&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Affected versions &lt;br /&gt;&lt;/strong&gt;&lt;span class=&quot;TextRun SCXW229541896 BCX0&quot;&gt;&lt;span class=&quot;NormalTextRun SCXW229541896 BCX0&quot;&gt;Any Forms version before 5.7.0 (CMS12) or Forms 4.31.0 (CMS11)&lt;/span&gt;&lt;span class=&quot;NormalTextRun SCXW229541896 BCX0&quot;&gt;.&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;EOP SCXW229541896 BCX0&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Remediation&lt;/strong&gt;&lt;br /&gt;&lt;span class=&quot;NormalTextRun SCXW152076525 BCX0&quot;&gt;If using the affected versions of &lt;/span&gt;&lt;span class=&quot;NormalTextRun SpellingErrorV2Themed SCXW152076525 BCX0&quot;&gt;EPiServer.Forms&lt;/span&gt;&lt;span class=&quot;NormalTextRun SCXW152076525 BCX0&quot;&gt; listed above, please update to version 5.7.0 (CMS12) or Forms 4.31.0 (CMS11).&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;Please reach out to our support for further guidance by email to&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;mailto:support@optimizely.com&quot;&gt;support@optimizely.com&lt;/a&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;or submit a request at&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;span&gt;&lt;span class=&quot;ui-provider rw cvi ajm cvj cvk cvl cvm cvn cvo cvp cvq cvr cvs cvt cvu cvv cvw cvx cvy cvz cwa cwb cwc cwd cwe cwf cwg cwh cwi cwj cwk cwl cwm cwn cwo&quot;&gt;&lt;a href=&quot;https://support.optimizely.com/hc/en-us&quot;&gt;https://support.optimizely.com/hc/en-us&lt;/a&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;Questions&lt;/h3&gt;
&lt;p&gt;If you have any questions, please contact our support team (with assistance from our &lt;span&gt;security engineering team)&lt;/span&gt; at &lt;a href=&quot;mailto:support@optimizely.com&quot;&gt;support@optimizely.com&lt;/a&gt;&lt;span&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;Risk definitions&lt;/h3&gt;
&lt;p&gt;Low &amp;ndash; little to no potential impact on Optimizely or customer environments/data. Vulnerability has low exploitability, for example: requirement for local or physical system access, zero reachability to/executability within Optimizely products/code.&lt;/p&gt;
&lt;p&gt;Medium &amp;ndash; some potential impact on Optimizely or customer environments/data. Vulnerability has medium exploitability, for example: requirement to be located on the same local network as the target, requirement for an individual to be manipulated via social engineering, requirement for user privileges, vulnerability achieves limited access to Optimizely products/code.&lt;/p&gt;
&lt;p&gt;High &amp;ndash; high potential impact on Optimizely or customer environments/data.&amp;nbsp; Vulnerability has high exploitability, for example:&amp;nbsp; achieves high level access to Optimizely products/code, could elevate privileges, could result in a significant data loss or downtime.&lt;/p&gt;
&lt;p&gt;Critical &amp;ndash; very significant potential impact on Optimizely or customer environments/data.&amp;nbsp; Vulnerability has very high exploitability, for example: achieves admin/root-level access to Optimizely products/code.&amp;nbsp; Vulnerability does not require any special authentication credentials/knowledge of Optimizely products/environments.&lt;/p&gt;</id><updated>2023-10-25T04:10:08.0000000Z</updated><summary type="html">Blog post</summary></entry> <entry><title>Forms 4.6 performance enhancement</title><link href="https://world.optimizely.com/blogs/phu-nguyen/dates/2017/8/forms-4-6-performance-enhancement/" /><id>&lt;!DOCTYPE html&gt;
&lt;html&gt;
&lt;head&gt;
&lt;/head&gt;
&lt;body&gt;
&lt;p&gt;After using DotTrace and&lt;span&gt;&amp;nbsp;&lt;/span&gt;Jmeter&lt;span&gt;&amp;nbsp;&lt;/span&gt;to analyze Forms performance issues, we found some problematic code segments, which created issues like slow response time or high CPU usage. Therefore, we internally changed the Forms API&amp;nbsp;in order to reduce data processing time.&lt;/p&gt;
&lt;p&gt;From version 4.6.0, Forms with DDS as the default data storage mechanism has much better performance compared to the previous versions, especially for forms with a large number of submissions. Below is a performance comparison of Forms 4.6.0 and 4.5.1. Our comparison uses&lt;span&gt;&amp;nbsp;&lt;/span&gt;Jmeter&lt;span&gt;&amp;nbsp;&lt;/span&gt;with more than 20,000 records (all tests are run on the developer&#39;s computer).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Forms 4.6.0 takes about 30 seconds to finish the test.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;/link/15b11db79eac416aa83db2da7c543f21.aspx&quot; width=&quot;1079&quot; alt=&quot;4.6&quot; height=&quot;426&quot; /&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Forms 4.5.1 takes more than 3 hours to finish that test.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;/link/138cf9ba3628474d86e3decc107caf08.aspx&quot; width=&quot;1093&quot; alt=&quot;4.5.1&quot; height=&quot;505&quot; /&gt;&lt;/p&gt;
&lt;p&gt;We ran another test, and the results&lt;span&gt;&amp;nbsp;&lt;/span&gt;looks&lt;span&gt;&amp;nbsp;&lt;/span&gt;quite promising when comparing MongoDB to&amp;nbsp;DDS as the data storage mechanism.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;/link/f611e4fbe86844708e901c2587c08c40.aspx&quot; width=&quot;1343&quot; alt=&quot;DDS and MongoDB&quot; height=&quot;344&quot; /&gt;&lt;/p&gt;
&lt;/body&gt;
&lt;/html&gt;</id><updated>2017-08-03T06:12:02.0000000Z</updated><summary type="html">Blog post</summary></entry></feed>