DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. Prior to version 10.1.0, DNN’s URL/path handling and template rendering can allow specially crafted input to be reflected into a user profile that is returned to the browser. In these cases, the application does not sufficiently neutralize or encode characters that are meaningful in HTML, so an attacker can cause a victim’s browser to interpret attacker-controlled content as part of the page’s HTML. This issue has been patched in version 10.1.0.

Project Subscriptions

Vendors Products
Dnnsoftware Subscribe
Dnn Platform Subscribe
Dotnetnuke Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2025-30894 DNN vulnerable to Reflected Cross-Site Scripting (XSS) using url to profile
Github GHSA Github GHSA GHSA-jc4g-c8ww-5738 DNN vulnerable to Reflected Cross-Site Scripting (XSS) using url to profile
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 29 Sep 2025 13:00:00 +0000

Type Values Removed Values Added
First Time appeared Dnnsoftware dotnetnuke
CPEs cpe:2.3:a:dnnsoftware:dotnetnuke:*:*:*:*:*:*:*:*
Vendors & Products Dnnsoftware dotnetnuke

Thu, 25 Sep 2025 08:30:00 +0000

Type Values Removed Values Added
First Time appeared Dnnsoftware
Dnnsoftware dnn Platform
Vendors & Products Dnnsoftware
Dnnsoftware dnn Platform

Tue, 23 Sep 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 23 Sep 2025 18:00:00 +0000

Type Values Removed Values Added
Description DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. Prior to version 10.1.0, DNN’s URL/path handling and template rendering can allow specially crafted input to be reflected into a user profile that is returned to the browser. In these cases, the application does not sufficiently neutralize or encode characters that are meaningful in HTML, so an attacker can cause a victim’s browser to interpret attacker-controlled content as part of the page’s HTML. This issue has been patched in version 10.1.0.
Title DNN vulnerable to Reflected Cross-Site Scripting (XSS) using url to profile
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-09-23T18:37:15.165Z

Reserved: 2025-09-22T14:34:03.470Z

Link: CVE-2025-59821

cve-icon Vulnrichment

Updated: 2025-09-23T18:29:55.786Z

cve-icon NVD

Status : Analyzed

Published: 2025-09-23T18:15:41.313

Modified: 2025-09-29T12:58:27.157

Link: CVE-2025-59821

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-09-25T08:22:11Z

Weaknesses