Cyber Posture

CVE-2026-24837

High

Published: 28 January 2026

Published
28 January 2026
Modified
04 February 2026
KEV Added
Patch
CVSS Score 7.6 CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H
EPSS Score 0.0001 2.6th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-24837 is a high-severity Cross-site Scripting (CWE-79) vulnerability in Dnnsoftware Dotnetnuke. Its CVSS base score is 7.6 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Browser Session Hijacking (T1185); ranked at the 2.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Browser Session Hijacking (T1185) and 2 other techniques.
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-79

Penetration testing submits XSS payloads to web applications, detecting cross-site scripting flaws for subsequent remediation.

addresses: CWE-79

Validates web inputs to reject script-related content that could produce XSS.

addresses: CWE-79

Output validation against expected content can reject or sanitize script content in generated web pages, reducing XSS exploitability.

MITRE ATT&CK Enterprise TechniquesAI

T1185 Browser Session Hijacking Collection
Adversaries may take advantage of security vulnerabilities and inherent functionality in browser software to change content, modify user-behaviors, and intercept information as part of various browser session hijacking techniques.
T1539 Steal Web Session Cookie Credential Access
An adversary may steal web application or service session cookies and use them to gain access to web applications or Internet services as an authenticated user without needing credentials.
T1491.002 External Defacement Impact
An adversary may deface systems external to an organization in an attempt to deliver messaging, intimidate, or otherwise mislead an organization or users.
Why these techniques?

Stored XSS in authenticated admin interface directly enables browser session hijacking and web session cookie theft via injected scripts; also facilitates external defacement as explicitly noted in impact description.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. Starting in version 9.0.0 and prior to versions 9.13.10 and 10.2.0, a module friendly name could include scripts that will run during some module operations…

more

in the Persona Bar. Versions 9.13.10 and 10.2.0 contain a fix for the issue.

Deeper analysisAI

CVE-2026-24837 is a cross-site scripting (XSS) vulnerability (CWE-79) in DNN Platform, an open-source web content management system (CMS) formerly known as DotNetNuke and part of the Microsoft ecosystem. The issue affects versions starting from 9.0.0 up to but not including 9.13.10 and 10.2.0, where a module's friendly name can embed scripts that execute during certain module operations within the Persona Bar administrative interface. The vulnerability has a CVSS v3.1 base score of 7.6 (AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H), indicating high impact potential despite elevated requirements for exploitation.

Exploitation requires an attacker to have high privileges (PR:H) on the target DNN instance, combined with high attack complexity (AC:H) and user interaction (UI:R). A malicious actor with such access could craft a module friendly name containing scripts, tricking a privileged administrator into performing a module operation in the Persona Bar that triggers execution. Successful exploitation allows scope change (S:C) with high impacts on confidentiality, integrity, and availability (C:I:A:H), potentially enabling data theft, site defacement, or arbitrary code execution in the context of the administrative session.

The official GitHub security advisory for DNN Platform (GHSA-vm5q-8qww-h238) confirms that versions 9.13.10 and 10.2.0 address the vulnerability through targeted fixes. Security practitioners should prioritize upgrading affected DNN installations to these patched versions and review module configurations for any untrusted friendly names.

Details

CWE(s)

Affected Products

dnnsoftware
dotnetnuke
9.0.0 — 9.13.10 · 10.0.0 — 10.2.0

CVEs Like This One

CVE-2026-24836Same product: Dnnsoftware Dotnetnuke
CVE-2026-24833Same product: Dnnsoftware Dotnetnuke
CVE-2026-24838Same product: Dnnsoftware Dotnetnuke
CVE-2025-64095Same product: Dnnsoftware Dotnetnuke
CVE-2026-40321Same product: Dnnsoftware Dotnetnuke
CVE-2025-49249Shared CWE-79
CVE-2026-26022Shared CWE-79
CVE-2026-27070Shared CWE-79
CVE-2026-4108Shared CWE-79
CVE-2025-23429Shared CWE-79

References