CVE-2025-59545
C# vulnerability analysis and mitigation

Overview

DNN (formerly DotNetNuke), an open-source web content management platform in the Microsoft ecosystem, was found to contain a critical stored cross-site scripting (XSS) vulnerability (CVE-2025-59545) in its Prompt module. The vulnerability affects all versions prior to 10.1.0 and was discovered in September 2025. With over 750,000 websites using DNN globally, this security flaw impacts a significant number of installations (Security Online, NVD).

Technical details

The vulnerability stems from the Prompt module's ability to execute commands that return raw HTML without proper sanitization. While DNN sanitizes most user-submitted data for display, the Prompt module processes malicious input in ways that bypass these defenses. The flaw is tracked with a CVSS v3.1 base score of 9.0 (Critical) with the vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H, indicating network-based attack vector, low complexity, and high impact across confidentiality, integrity, and availability (GitHub Advisory, GBHackers).

Impact

The vulnerability allows attackers to inject and execute arbitrary scripts in the context of privileged users, potentially leading to complete administrative control over affected sites. This could result in session hijacking, data theft, unauthorized actions under elevated privileges, or redirection to attacker-controlled domains. The risk is particularly severe as the Prompt module is typically used by site administrators for troubleshooting or configuration tasks (GBHackers).

Mitigation and workarounds

DNN has released version 10.1.0 to patch this vulnerability. Organizations are strongly urged to update immediately. For those unable to upgrade immediately, it is recommended to restrict access to the Prompt module and monitor administrative activity logs for signs of suspicious command execution. Additional security measures include implementing Web Application Firewall (WAF) rules and enforcing Content Security Policy (CSP) (Security Online).

Additional resources


SourceThis report was generated using AI

Related C# vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-67288CRITICAL10
  • C#C#
  • Umbraco.Cms
NoNoDec 22, 2025
CVE-2025-68618HIGH7.5
  • C#C#
  • Magick.NET-Q8-OpenMP-arm64
NoYesDec 30, 2025
CVE-2025-68950MEDIUM6.2
  • C#C#
  • ImageMagick
NoYesDec 30, 2025
CVE-2025-67291MEDIUM6.1
  • C#C#
  • Piranha
NoNoDec 22, 2025
CVE-2025-67290MEDIUM6.1
  • C#C#
  • Piranha
NoNoDec 22, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management