DNNPLATFORM, Reflected Cross-Site Scripting (XSS), CVE-2025-XXXX (Moderate)

Listen to this Post

How the CVE Works

The vulnerability arises when DNN.PLATFORM processes user-supplied input via `TokenReplace` in certain `SkinObjects` without proper sanitization. Attackers can craft malicious URLs containing JavaScript payloads, which are then reflected in the output. When victims click the manipulated link, the script executes in their browser context, potentially leading to session hijacking, defacement, or data theft. The issue stems from insufficient input validation during token parsing, allowing arbitrary script injection.

DailyCVE Form

Platform: DNN.PLATFORM
Version: <10.0.1
Vulnerability: Reflected XSS
Severity: Moderate
Date: Jun 20, 2025

Prediction: Patch expected by Jul 10, 2025

What Undercode Say

Analytics:

curl -X GET "http://vulnerable-dnn/api/tokenreplace?input=<script>alert(1)</script>"
grep -r "TokenReplace" /DNN.Modules/

How Exploit:

http://target-dnn/page?malicious=<script>document.cookie</script>

Protection from this CVE:

  • Upgrade to v10.0.1
  • Sanitize `TokenReplace` inputs
  • Enable CSP headers

Impact:

  • Session hijacking
  • Data leakage
  • UI manipulation

Sources:

Reported By: github.com
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top