CVE-2025-52485 - Medium Severity Vulnerability
Vulnerable Library - DotNetNuke-9.2.1.533.dll
DotNetNuke
Library home page: https://api.nuget.org/packages/dotnetnuke.core.9.2.1.533.nupkg
Path to vulnerable library: /packages/DotNetNuke.Core.9.2.1.533/lib/net40/DotNetNuke.dll
Dependency Hierarchy:
- ❌ DotNetNuke-9.2.1.533.dll (Vulnerable Library)
Found in HEAD commit: 9b2fdadcb0ce9dacb6e87e0b604cf35d751503be
Found in base branch: master
Vulnerability Details
DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. In versions 6.0.0 to before 10.0.1, DNN.PLATFORM allows a specially crafted request to inject scripts in the Activity Feed Attachments endpoint which will then render in the feed. This issue has been patched in version 10.0.1.
Publish Date: 2025-06-21
URL: CVE-2025-52485
CVSS 3 Score Details (5.4)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
For more information on CVSS3 Scores, click here.
Step up your Open Source Security Game with Mend here
CVE-2025-52485 - Medium Severity Vulnerability
DotNetNuke
Library home page: https://api.nuget.org/packages/dotnetnuke.core.9.2.1.533.nupkg
Path to vulnerable library: /packages/DotNetNuke.Core.9.2.1.533/lib/net40/DotNetNuke.dll
Dependency Hierarchy:
Found in HEAD commit: 9b2fdadcb0ce9dacb6e87e0b604cf35d751503be
Found in base branch: master
DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. In versions 6.0.0 to before 10.0.1, DNN.PLATFORM allows a specially crafted request to inject scripts in the Activity Feed Attachments endpoint which will then render in the feed. This issue has been patched in version 10.0.1.
Publish Date: 2025-06-21
URL: CVE-2025-52485
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
For more information on CVSS3 Scores, click here.Step up your Open Source Security Game with Mend here