CVE-2025-64095
📋 TL;DR
This vulnerability allows unauthenticated attackers to upload and overwrite files in DNN CMS systems. It enables website defacement and can be combined with other issues to inject XSS payloads. All DNN installations prior to version 10.1.1 with the default HTML editor provider are affected.
💻 Affected Systems
- DNN Platform (formerly DotNetNuke)
📦 What is this software?
Dotnetnuke by Dnnsoftware
⚠️ Risk & Real-World Impact
Worst Case
Complete website takeover through file overwrites leading to persistent XSS, credential theft, and potential server compromise if combined with other vulnerabilities.
Likely Case
Website defacement through image/file replacement and limited XSS attacks affecting site visitors.
If Mitigated
No impact if proper authentication controls and file upload restrictions are implemented.
🎯 Exploit Status
Simple file upload exploitation with no authentication required; trivial for attackers to weaponize.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 10.1.1
Vendor Advisory: https://github.com/dnnsoftware/Dnn.Platform/security/advisories/GHSA-3m8r-w7xg-jqvw
Restart Required: Yes
Instructions:
1. Backup your DNN installation and database. 2. Download DNN Platform 10.1.1 or later from official sources. 3. Follow DNN upgrade documentation to apply the update. 4. Restart the application pool/IIS. 5. Verify the update was successful.
🔧 Temporary Workarounds
Disable Default HTML Editor Provider
windowsReplace the vulnerable HTML editor provider with a secure alternative or disable file upload functionality.
Implement Web Application Firewall Rules
allBlock unauthenticated file upload requests to DNN endpoints.
🧯 If You Can't Patch
- Implement strict authentication requirements for all file upload endpoints
- Apply network-level restrictions to limit access to DNN administration interfaces
🔍 How to Verify
Check if Vulnerable:
Check DNN version in Host Settings > Basic Settings; versions below 10.1.1 are vulnerable.
Check Version:
Check Host Settings in DNN admin panel or examine web.config version information
Verify Fix Applied:
Confirm version is 10.1.1 or higher and test that unauthenticated file uploads are properly rejected.
📡 Detection & Monitoring
Log Indicators:
- Unauthenticated POST requests to file upload endpoints
- Unexpected file modifications in DNN directories
Network Indicators:
- Unusual file upload traffic to DNN from unauthenticated sources
SIEM Query:
source="dnn_logs" AND (uri_path="*/FileUpload/*" OR uri_path="*/ImageUpload/*") AND user="anonymous"