CVE-2025-64095
Published: 28 October 2025
Summary
CVE-2025-64095 is a critical-severity Unrestricted Upload of File with Dangerous Type (CWE-434) vulnerability in Dnnsoftware Dotnetnuke. Its CVSS base score is 10.0 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 4.5% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-14 (Permitted Actions Without Identification or Authentication) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Limits permitted actions without identification or authentication, directly preventing unauthenticated file uploads and overwrites in the DNN HTML editor provider.
Enforces validation of information inputs to block unrestricted uploads of dangerous file types that enable overwriting and potential XSS injection.
Remediates the specific flaw in DNN versions prior to 10.1.1 by applying security patches and verifying flaw correction.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Unauthenticated file upload vulnerability in public-facing CMS directly enables T1190 (exploit public-facing application), facilitates web shell deployment via malicious file upload (T1505.003), and explicitly supports website defacement (T1491.002).
NVD Description
DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. Prior to 10.1.1, the default HTML editor provider allows unauthenticated file uploads and images can overwrite existing files. An unauthenticated user can upload and replace…
more
existing files allowing defacing a website and combined with other issue, injection XSS payloads. This vulnerability is fixed in 10.1.1.
Deeper analysisAI
CVE-2025-64095 is a critical vulnerability in DNN (formerly DotNetNuke), an open-source web content management platform (CMS) within the Microsoft ecosystem. In versions prior to 10.1.1, the default HTML editor provider allows unauthenticated file uploads, enabling images to overwrite existing files on the server. This issue, which maps to CWE-434 (Unrestricted Upload of File with Dangerous Type), carries a CVSS v3.1 base score of 10.0 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H).
An unauthenticated attacker can exploit this vulnerability over the network with low complexity and no user interaction required. By uploading malicious files, the attacker can replace existing ones, leading to website defacement. When combined with other vulnerabilities, this facilitates the injection of XSS payloads.
The vulnerability has been addressed in DNN version 10.1.1. Additional details on the issue and mitigation are available in the security advisory at https://github.com/dnnsoftware/Dnn.Platform/security/advisories/GHSA-3m8r-w7xg-jqvw.
Details
- CWE(s)