CVE-2026-24837

7.6 HIGH

📋 TL;DR

This vulnerability allows attackers to inject malicious scripts into DNN module friendly names, which then execute during certain Persona Bar operations. It affects DNN CMS versions 9.0.0 through 9.13.9 and 10.0.0 through 10.1.x. Attackers with module management privileges can exploit this to perform cross-site scripting attacks.

💻 Affected Systems

Products:
  • DNN Platform (formerly DotNetNuke)
Versions: 9.0.0 through 9.13.9, and 10.0.0 through 10.1.x
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access with module management privileges. Persona Bar must be enabled (default in affected versions).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Privileged attacker executes arbitrary JavaScript in admin context, potentially stealing admin credentials, performing administrative actions, or compromising the entire CMS installation.

🟠

Likely Case

Authenticated user with module management privileges injects malicious scripts that execute when other administrators view or manage modules, leading to session hijacking or limited administrative actions.

🟢

If Mitigated

With proper access controls limiting module management to trusted administrators only, impact is reduced to potential privilege escalation among administrative users.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access with module management permissions. The vulnerability is in the Persona Bar interface which is enabled by default.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 9.13.10 or 10.2.0

Vendor Advisory: https://github.com/dnnsoftware/Dnn.Platform/security/advisories/GHSA-vm5q-8qww-h238

Restart Required: Yes

Instructions:

1. Backup your DNN installation and database. 2. Download DNN Platform version 9.13.10 or 10.2.0 from the official repository. 3. Follow the standard DNN upgrade procedure for your version. 4. Restart the application pool in IIS. 5. Verify the Persona Bar functions correctly.

🔧 Temporary Workarounds

Restrict Module Management Permissions

all

Limit module management capabilities to only essential, trusted administrators to reduce attack surface.

Disable Persona Bar for Non-Essential Users

all

Configure DNN to disable Persona Bar access for users who don't require administrative functions.

🧯 If You Can't Patch

  • Implement strict input validation and sanitization for all module friendly name fields
  • Deploy a web application firewall (WAF) with XSS protection rules

🔍 How to Verify

Check if Vulnerable:

Check DNN version in Host Settings > Host Details. If version is between 9.0.0-9.13.9 or 10.0.0-10.1.x, the system is vulnerable.

Check Version:

Check Host Settings in DNN admin panel or examine web.config file for version information.

Verify Fix Applied:

After patching, verify version shows 9.13.10 or 10.2.0 in Host Settings. Test module friendly name fields to ensure script tags are properly sanitized.

📡 Detection & Monitoring

Log Indicators:

  • Unusual module creation/modification events
  • Suspicious strings in module friendly name fields
  • JavaScript execution errors in Persona Bar

Network Indicators:

  • Unexpected JavaScript payloads in HTTP requests to module management endpoints

SIEM Query:

source="dnn_logs" AND (event="module_update" OR event="module_create") AND (friendly_name CONTAINS "<script>" OR friendly_name CONTAINS "javascript:")

🔗 References

📤 Share & Export