CVE-2026-24837
Published: 28 January 2026
Summary
CVE-2026-24837 is a high-severity Cross-site Scripting (CWE-79) vulnerability in Dnnsoftware Dotnetnuke. Its CVSS base score is 7.6 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Browser Session Hijacking (T1185); ranked at the 2.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Penetration testing submits XSS payloads to web applications, detecting cross-site scripting flaws for subsequent remediation.
Validates web inputs to reject script-related content that could produce XSS.
Output validation against expected content can reject or sanitize script content in generated web pages, reducing XSS exploitability.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Stored XSS in authenticated admin interface directly enables browser session hijacking and web session cookie theft via injected scripts; also facilitates external defacement as explicitly noted in impact description.
NVD Description
DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. Starting in version 9.0.0 and prior to versions 9.13.10 and 10.2.0, a module friendly name could include scripts that will run during some module operations…
more
in the Persona Bar. Versions 9.13.10 and 10.2.0 contain a fix for the issue.
Deeper analysisAI
CVE-2026-24837 is a cross-site scripting (XSS) vulnerability (CWE-79) in DNN Platform, an open-source web content management system (CMS) formerly known as DotNetNuke and part of the Microsoft ecosystem. The issue affects versions starting from 9.0.0 up to but not including 9.13.10 and 10.2.0, where a module's friendly name can embed scripts that execute during certain module operations within the Persona Bar administrative interface. The vulnerability has a CVSS v3.1 base score of 7.6 (AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H), indicating high impact potential despite elevated requirements for exploitation.
Exploitation requires an attacker to have high privileges (PR:H) on the target DNN instance, combined with high attack complexity (AC:H) and user interaction (UI:R). A malicious actor with such access could craft a module friendly name containing scripts, tricking a privileged administrator into performing a module operation in the Persona Bar that triggers execution. Successful exploitation allows scope change (S:C) with high impacts on confidentiality, integrity, and availability (C:I:A:H), potentially enabling data theft, site defacement, or arbitrary code execution in the context of the administrative session.
The official GitHub security advisory for DNN Platform (GHSA-vm5q-8qww-h238) confirms that versions 9.13.10 and 10.2.0 address the vulnerability through targeted fixes. Security practitioners should prioritize upgrading affected DNN installations to these patched versions and review module configurations for any untrusted friendly names.
Details
- CWE(s)