Description
DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. Prior to versions 9.13.10 and 10.2.0, a module could install with richtext in its description field which could contain scripts that will run for user in the Persona Bar. Versions 9.13.10 and 10.2.0 contain a fix for the issue.
Published: 2026-01-27
Score: 7.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting (XSS)
Action: Patch Now
AI Analysis

Impact

The issue originates from DNN modules that allow richtext in their description field, which can contain JavaScript that executes for any user who opens the module in the Persona Bar. This stored XSS can enable attackers to run arbitrary scripts in the victim’s browser, steal session cookies, deface content, or perform further attacks against users of the CMS. The flaw is limited to the context of module description rendering and does not provide arbitrary code execution on the server.

Affected Systems

Vulnerable versions of DNN Platform (formerly DotNetNuke) are those before 9.13.10 for the 9.x series and before 10.2.0 for the 10.x series. The problem exists in the core platform code that renders module descriptions, affecting any site that uses the open‑source CMS in the Microsoft ecosystem.

Risk and Exploitability

The CVSS score of 7.7 categorizes the vulnerability as high severity. The EPSS score being less than 1% indicates a very low likelihood that it will be exploited in the wild, and the vulnerability is not yet listed in CISA’s KEV catalog. Attackers would most commonly exploit the flaw by installing a malicious module or submitting a script‑laden description through a privileged content‑authoring interface. While broad system impact exists for any site that permits richtext in module descriptions, the risk is mitigated by access controls; mis‑configured or privileged users provide the necessary entry point.

Generated by OpenCVE AI on April 18, 2026 at 14:43 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the official patch by upgrading to DNN Platform 9.13.10 or later, or 10.2.0 or later, following the vendor’s release notes.
  • Verify that no existing modules contain script‑enabled descriptions; remove any scripts if found and test.
  • Disable script execution in rich text editors by configuring the module's description field to allow only safe markup, and restrict privileged access to the Persona Bar.

Generated by OpenCVE AI on April 18, 2026 at 14:43 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 04 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Dnnsoftware dotnetnuke
CPEs cpe:2.3:a:dnnsoftware:dotnetnuke:*:*:*:*:*:*:*:*
Vendors & Products Dnnsoftware dotnetnuke

Wed, 28 Jan 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 28 Jan 2026 12:30:00 +0000

Type Values Removed Values Added
First Time appeared Dnnsoftware
Dnnsoftware dnn Platform
Vendors & Products Dnnsoftware
Dnnsoftware dnn Platform

Wed, 28 Jan 2026 00:00:00 +0000

Type Values Removed Values Added
Description DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. Prior to versions 9.13.10 and 10.2.0, a module could install with richtext in its description field which could contain scripts that will run for user in the Persona Bar. Versions 9.13.10 and 10.2.0 contain a fix for the issue.
Title DotNetNuke.Core Vulnerable to Stored XSS in Module Description
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 7.7, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H'}


Subscriptions

Dnnsoftware Dnn Platform Dotnetnuke
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-01-28T21:05:02.861Z

Reserved: 2026-01-27T14:51:03.058Z

Link: CVE-2026-24833

cve-icon Vulnrichment

Updated: 2026-01-28T21:04:58.493Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-28T00:15:50.773

Modified: 2026-02-04T20:12:35.700

Link: CVE-2026-24833

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T14:45:03Z

Weaknesses