CVE-2025-64095
C# vulnerability analysis and mitigation

Overview

DNN (formerly DotNetNuke), an open-source web content management platform in the Microsoft ecosystem, disclosed a critical vulnerability (CVE-2025-64095) on October 28, 2025. The vulnerability affects all versions prior to 10.1.1 and involves the default HTML editor provider allowing unauthenticated file uploads and image overwrites (NVD, GitHub Advisory).

Technical details

The vulnerability has been assigned a Critical CVSS v3.1 base score of 10.0 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H). The flaw is classified as CWE-434 (Unrestricted Upload of File with Dangerous Type). The vulnerability resides within the default HTML editor provider, specifically in the CKEditor provider component, affecting two endpoints: Providers/HtmlEditorProviders/DNNConnect.CKE/Browser/FileUploader.ashx and Providers/HtmlEditorProviders/DNNConnect.CKE/Browser/Browser.aspx (Miggo).

Impact

The vulnerability allows unauthenticated users to upload and replace existing files on affected websites, enabling website defacement. When combined with other vulnerabilities, it can facilitate the injection of XSS payloads, potentially leading to session hijacking and credential theft. With over 750,000 websites using the DNN Platform, the potential impact is widespread (SecurityOnline).

Mitigation and workarounds

The vulnerability has been patched in version 10.1.1 of the DNN Platform. Site administrators are strongly advised to update immediately to this version. Additionally, administrators should review their file logs for any unauthorized or suspicious file uploads if they were running an unpatched version (SecurityOnline).

Community reactions

The security community has responded with high concern due to the critical nature of the vulnerability and its potential impact on the large DNN user base. The vulnerability has garnered significant attention due to its maximum CVSS score of 10.0 and the widespread use of the DNN Platform (SecurityOnline).

Additional resources


SourceThis report was generated using AI

Related C# vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-64113CRITICAL9.3
  • C#C#
  • MediaBrowser.Server.Core
NoYesDec 09, 2025
CVE-2025-66628HIGH7.5
  • C#C#
  • cpe:2.3:a:imagemagick:imagemagick
NoYesDec 10, 2025
CVE-2025-66631HIGH7.2
  • C#C#
  • Csla
NoYesDec 09, 2025
CVE-2025-66625MEDIUM4.9
  • C#C#
  • Umbraco.Cms
NoYesDec 09, 2025
CVE-2025-65955MEDIUM4.9
  • C#C#
  • Magick.NET-Q8-OpenMP-x64
NoYesDec 02, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management