Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64095: CWE-434: Unrestricted Upload of File with Dangerous Type in dnnsoftware Dnn.Platform

0
Critical
VulnerabilityCVE-2025-64095cvecve-2025-64095cwe-434
Published: Tue Oct 28 2025 (10/28/2025, 21:46:11 UTC)
Source: CVE Database V5
Vendor/Project: dnnsoftware
Product: Dnn.Platform

Description

DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. Prior to 10.1.1, the default HTML editor provider allows unauthenticated file uploads and images can overwrite existing files. An unauthenticated user can upload and replace existing files allowing defacing a website and combined with other issue, injection XSS payloads. This vulnerability is fixed in 10.1.1.

AI-Powered Analysis

AILast updated: 11/05/2025, 02:14:37 UTC

Technical Analysis

CVE-2025-64095 is a critical security vulnerability identified in the Dnn.Platform content management system, an open-source web CMS built on the Microsoft technology stack. The vulnerability arises from the default HTML editor provider in versions prior to 10.1.1, which permits unauthenticated users to upload files without proper validation or restriction on file types. This unrestricted upload capability allows attackers to upload malicious files or images that can overwrite existing files on the server. The consequence is multifold: attackers can deface websites by replacing legitimate content, and when combined with other vulnerabilities, they can inject cross-site scripting (XSS) payloads, compromising user sessions and potentially leading to further exploitation. The vulnerability is classified under CWE-434, which pertains to the unrestricted upload of files with dangerous types. The CVSS v3.1 score is 10.0, indicating maximum severity, with attack vector network (AV:N), no privileges required (PR:N), no user interaction (UI:N), and scope changed (S:C), impacting confidentiality, integrity, and availability at the highest levels. Although no known exploits are currently reported in the wild, the ease of exploitation and the critical impact make this a pressing threat. The issue was publicly disclosed on October 28, 2025, and fixed in Dnn.Platform version 10.1.1. Organizations running affected versions should prioritize patching to mitigate risks.

Potential Impact

For European organizations, this vulnerability poses a severe risk to web infrastructure, particularly those relying on Dnn.Platform for public-facing websites or intranet portals. Successful exploitation can lead to complete website defacement, damaging brand reputation and customer trust. The ability to overwrite files and inject XSS payloads threatens the confidentiality of user data and session integrity, potentially enabling further attacks such as credential theft or malware distribution. Availability is also at risk, as attackers could disrupt services by replacing critical files. Given the critical CVSS score and unauthenticated exploit vector, attackers can easily target vulnerable systems remotely without any user interaction. This threat is especially concerning for sectors with high regulatory requirements for data protection, such as finance, healthcare, and government agencies within Europe. The potential for cascading attacks leveraging this vulnerability could lead to significant operational disruptions and legal consequences under GDPR.

Mitigation Recommendations

Immediate mitigation requires upgrading all Dnn.Platform instances to version 10.1.1 or later, where the vulnerability is patched. Organizations should audit their current CMS versions and prioritize patch deployment. In addition to patching, administrators should review and harden file upload configurations by restricting allowed file types explicitly and implementing server-side validation to prevent dangerous file uploads. Employing web application firewalls (WAFs) with rules to detect and block suspicious upload attempts can provide an additional layer of defense. Monitoring file integrity on web servers can help detect unauthorized changes promptly. It is also advisable to implement strict access controls and disable or limit anonymous upload capabilities where possible. Regular security assessments and penetration testing focused on file upload functionalities should be conducted to identify residual risks. Finally, educating developers and administrators on secure coding and configuration practices related to file handling will reduce future vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-10-27T15:26:14.126Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6901419f608506ea438f86a9

Added to database: 10/28/2025, 10:20:15 PM

Last enriched: 11/5/2025, 2:14:37 AM

Last updated: 12/13/2025, 9:12:37 AM

Views: 929

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats