CVE-2025-52487

7.5 HIGH

📋 TL;DR

This vulnerability allows attackers to bypass DNN Login IP Filters, enabling login attempts from IP addresses not on the allow list. It affects DNN.PLATFORM versions 7.0.0 through 10.0.0, potentially exposing CMS admin interfaces to unauthorized access.

💻 Affected Systems

Products:
  • DNN.PLATFORM (formerly DotNetNuke)
Versions: 7.0.0 to 10.0.0
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems using DNN Login IP Filters feature; if IP filtering is not configured, vulnerability may not be exploitable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain administrative access to the CMS, leading to complete system compromise, data theft, or website defacement.

🟠

Likely Case

Unauthorized users bypass IP restrictions to attempt brute-force attacks or gain limited access to user accounts.

🟢

If Mitigated

With strong authentication controls and monitoring, impact is limited to failed login attempts that trigger alerts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires crafting specific requests or using a proxy, but technical details are not publicly documented.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10.0.1

Vendor Advisory: https://github.com/dnnsoftware/Dnn.Platform/security/advisories/GHSA-fjhg-3mrh-mm7h

Restart Required: Yes

Instructions:

1. Backup your DNN installation and database. 2. Download DNN.PLATFORM version 10.0.1 or later from the official repository. 3. Follow the DNN upgrade documentation to apply the update. 4. Restart the application pool in IIS.

🔧 Temporary Workarounds

Disable or Restrict Login IP Filters

windows

Temporarily disable the vulnerable IP filtering feature or implement network-level IP restrictions.

Implement Web Application Firewall Rules

all

Configure WAF to block suspicious login patterns or proxy requests targeting DNN login endpoints.

🧯 If You Can't Patch

  • Implement network-level IP filtering at the firewall or load balancer to restrict access to DNN admin interfaces.
  • Enable multi-factor authentication (MFA) for all administrative accounts to reduce impact of credential compromise.

🔍 How to Verify

Check if Vulnerable:

Check the DNN version in the Host Settings page; if version is between 7.0.0 and 10.0.0 inclusive, the system is vulnerable.

Check Version:

Not applicable via command line; check through DNN admin interface at Host > Host Settings.

Verify Fix Applied:

After patching, confirm the version shows 10.0.1 or higher in Host Settings, and test that IP filtering works correctly.

📡 Detection & Monitoring

Log Indicators:

  • Failed login attempts from IP addresses not in the allow list
  • Unusual proxy headers in login requests

Network Indicators:

  • HTTP requests with crafted headers targeting /Login or authentication endpoints
  • Traffic from unexpected proxies or IP ranges

SIEM Query:

source="DNN_Logs" AND (event_type="Login_Failure" AND src_ip NOT IN allowed_ips) OR (http_user_agent contains "proxy")

🔗 References

📤 Share & Export