CVE-2026-24836

7.6 HIGH

📋 TL;DR

This vulnerability allows stored cross-site scripting (XSS) attacks in DNN CMS. Attackers with extension permissions can inject malicious scripts into log notes that execute when administrators view the PersonaBar interface. Affects DNN installations from version 9.0.0 up to (but not including) 9.13.10 and 10.2.0.

💻 Affected Systems

Products:
  • DNN Platform (formerly DotNetNuke)
Versions: 9.0.0 to 9.13.9, and 10.0.0 to 10.1.x
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires attacker to have extension permissions to write to log notes. PersonaBar is the administrative interface where the vulnerability triggers.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Administrator account compromise leading to full CMS takeover, data theft, or website defacement through stored XSS payloads in administrative interface.

🟠

Likely Case

Session hijacking of administrator accounts, credential theft, or unauthorized administrative actions through client-side script execution.

🟢

If Mitigated

Limited impact if administrators use browsers with strong XSS protection or script blockers, though risk remains for unprotected sessions.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access with extension permissions. The vulnerability is in how rich text in log notes is rendered in the PersonaBar.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 9.13.10 or 10.2.0

Vendor Advisory: https://github.com/dnnsoftware/Dnn.Platform/security/advisories/GHSA-2g5g-hcgh-q3rp

Restart Required: Yes

Instructions:

1. Backup your DNN installation and database. 2. Download version 9.13.10 or 10.2.0 from the official DNN repository. 3. Follow the DNN upgrade documentation for your version. 4. Restart the application pool in IIS. 5. Verify the PersonaBar displays log notes without script execution.

🔧 Temporary Workarounds

Disable PersonaBar access for non-essential users

all

Restrict PersonaBar access to only essential administrators to reduce attack surface.

Configure role permissions in DNN to limit PersonaBar access

Implement Content Security Policy (CSP)

windows

Add CSP headers to prevent script execution from untrusted sources in the PersonaBar.

Add CSP header via web.config or IIS settings

🧯 If You Can't Patch

  • Implement strict input validation and sanitization for all rich text fields in extensions
  • Monitor and audit log note entries for suspicious script-like content

🔍 How to Verify

Check if Vulnerable:

Check DNN version in Host Settings > Basic Settings. If version is between 9.0.0-9.13.9 or 10.0.0-10.1.x, the system is vulnerable.

Check Version:

Check Host Settings in DNN admin interface or examine web.config for version information

Verify Fix Applied:

After patching, verify version shows 9.13.10 or 10.2.0. Test by creating a log note with script tags and confirm they are sanitized in PersonaBar.

📡 Detection & Monitoring

Log Indicators:

  • Unusual log note entries containing script tags or JavaScript code
  • Multiple log entries from same extension in short time

Network Indicators:

  • HTTP requests to PersonaBar with suspicious parameters
  • Unexpected outbound connections from admin sessions

SIEM Query:

source="dnn_logs" AND (message="*<script>*" OR message="*javascript:*")

🔗 References

📤 Share & Export