
Cloud Vulnerability DB
コミュニティ主導の脆弱性データベース
DNN (formerly DotNetNuke), an open-source web content management platform in the Microsoft ecosystem, was found to contain a security vulnerability (CVE-2025-62802) in versions prior to 10.1.1. The vulnerability was disclosed on October 28, 2025, and involves the HTML editing functionality that incorrectly allowed unauthenticated users to upload files in the out-of-box configuration (GitHub Advisory, NVD).
The vulnerability has been assigned a CVSS v3.1 base score of 4.3 (Medium severity) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N. This indicates that the vulnerability is network-accessible, requires low attack complexity, needs no privileges, but does require user interaction. The scope is unchanged, with no impact on confidentiality, low impact on integrity, and no impact on availability (NVD, Miggo).
The vulnerability allows unauthenticated users to upload files through the HTML editing functionality, which could potentially be leveraged as a vector for other security issues. This capability is particularly concerning as it is not typically required for most implementations and represents an unnecessary security risk (GitHub Advisory).
The vulnerability has been fixed in version 10.1.1 of DNN Platform. The patch blocks the vulnerable endpoint from unauthenticated users by default. For implementations that specifically require unauthenticated uploads, administrators can modify the web.config file to remove the block and restore public access to the endpoint (GitHub Advisory).
ソース: このレポートは AI を使用して生成されました
無料の脆弱性評価
9つのセキュリティドメインにわたるクラウドセキュリティプラクティスを評価して、リスクレベルをベンチマークし、防御のギャップを特定します。
パーソナライズされたデモを見る
"私が今まで見た中で最高のユーザーエクスペリエンスは、クラウドワークロードを完全に可視化します。"
"Wiz を使えば、クラウド環境で何が起こっているかを 1 つの画面で確認することができます"
"Wizが何かを重要視した場合、それは実際に重要であることを私たちは知っています。"