Cyber Posture

CVE-2025-64095

Critical

Published: 28 October 2025

Published
28 October 2025
Modified
03 November 2025
KEV Added
Patch
CVSS Score 10.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.1462 94.5th percentile
Risk Priority 29 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may backdoor web servers with web shells to establish persistent access to systems.

Security Summary

CVE-2025-64095 is a critical vulnerability in DNN (formerly DotNetNuke), an open-source web content management platform (CMS) within the Microsoft ecosystem. In versions prior to 10.1.1, the default HTML editor provider allows unauthenticated file uploads, enabling images to overwrite existing files on the server. This issue, which maps to CWE-434 (Unrestricted Upload of File with Dangerous Type), carries a CVSS v3.1 base score of 10.0 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H).

An unauthenticated attacker can exploit this vulnerability over the network with low complexity and no user interaction required. By uploading malicious files, the attacker can replace existing ones, leading to website defacement. When combined with other vulnerabilities, this facilitates the injection of XSS payloads.

The vulnerability has been addressed in DNN version 10.1.1. Additional details on the issue and mitigation are available in the security advisory at https://github.com/dnnsoftware/Dnn.Platform/security/advisories/GHSA-3m8r-w7xg-jqvw.

Details

CWE(s)
CWE-434

Affected Products

dnnsoftware
dotnetnuke
≤ 10.1.1

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1491.002 External Defacement Impact
An adversary may deface systems external to an organization in an attempt to deliver messaging, intimidate, or otherwise mislead an organization or users.
T1505.003 Web Shell Persistence
Adversaries may backdoor web servers with web shells to establish persistent access to systems.
Why these techniques?

Unauthenticated file upload vulnerability in public-facing CMS directly enables T1190 (exploit public-facing application), facilitates web shell deployment via malicious file upload (T1505.003), and explicitly supports website defacement (T1491.002).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References