CVE-2025-64094

6.4 MEDIUM

📋 TL;DR

This CVE describes a cross-site scripting (XSS) vulnerability in DNN CMS where uploaded SVG files can contain malicious scripts that execute when viewed. The vulnerability affects DNN versions prior to 10.1.1 and represents an incomplete fix for CVE-2025-48378. Attackers can exploit this to steal session cookies, redirect users, or perform actions on their behalf.

💻 Affected Systems

Products:
  • DNN Platform (formerly DotNetNuke)
Versions: All versions prior to 10.1.1
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all DNN installations with file upload functionality enabled. The vulnerability is in the SVG file sanitization logic.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator session cookies, take over CMS administration, deface websites, or distribute malware to site visitors.

🟠

Likely Case

Attackers upload malicious SVG files that execute scripts in victims' browsers, potentially stealing user sessions or performing unauthorized actions.

🟢

If Mitigated

With proper input validation and output encoding, the risk is reduced but not eliminated without patching.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires ability to upload SVG files. The vulnerability is in sanitization logic, making exploitation moderately complex but feasible for skilled attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10.1.1

Vendor Advisory: https://github.com/dnnsoftware/Dnn.Platform/security/advisories/GHSA-hmvq-8p83-cq52

Restart Required: No

Instructions:

1. Backup your DNN installation and database. 2. Download DNN Platform version 10.1.1 from the official repository. 3. Follow the DNN upgrade documentation to apply the update. 4. Test functionality after upgrade.

🔧 Temporary Workarounds

Disable SVG file uploads

all

Modify DNN file upload settings to block SVG file uploads entirely

Navigate to Host > Host Settings > File Upload Extensions
Remove 'svg' from allowed extensions list

Implement WAF rules

all

Configure web application firewall to block malicious SVG content patterns

🧯 If You Can't Patch

  • Implement strict content security policy (CSP) headers to limit script execution
  • Monitor file upload logs for SVG upload attempts and investigate suspicious activity

🔍 How to Verify

Check if Vulnerable:

Check DNN version in Host > Host Settings > Basic Settings. If version is below 10.1.1, the system is vulnerable.

Check Version:

Check via DNN admin panel or examine web.config file for version information

Verify Fix Applied:

After upgrading, verify version shows 10.1.1 or higher in Host Settings. Test SVG upload functionality to ensure proper sanitization.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SVG file uploads
  • Multiple failed SVG upload attempts
  • Administrative actions from unexpected IP addresses

Network Indicators:

  • HTTP requests containing malicious SVG payloads
  • Unexpected outbound connections after SVG file access

SIEM Query:

source="dnn_logs" AND (file_extension="svg" OR file_type="image/svg+xml")

🔗 References

📤 Share & Export