DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. A url could be crafted to the DNN ImageHandler to render text from a querystring parameter. This text would display in the resulting image and a user that trusts the domain might think that the information is legitimate. This vulnerability is fixed in 9.13.4.
References
Configurations
History
26 Aug 2025, 00:48
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/dnnsoftware/Dnn.Platform/commit/5def7cc2e7931bb1041b21540bde99f96874a5a9 - Patch | |
References | () https://github.com/dnnsoftware/Dnn.Platform/security/advisories/GHSA-2rrc-g594-rhqw - Vendor Advisory | |
First Time |
Dnnsoftware dotnetnuke
Dnnsoftware |
|
Summary |
|
|
CPE | cpe:2.3:a:dnnsoftware:dotnetnuke:*:*:*:*:*:*:*:* |
09 Apr 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-04-09 16:15
Updated : 2025-08-26 00:48
NVD link : CVE-2025-32371
Mitre link : CVE-2025-32371
CVE.ORG link : CVE-2025-32371
JSON object : View
Products Affected
dnnsoftware
- dotnetnuke
CWE
CWE-451
User Interface (UI) Misrepresentation of Critical Information