Description
DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. Starting in version 9.0.0 and prior to versions 9.13.10 and 10.2.0, extensions could write richtext in log notes which can include scripts that would run in the PersonaBar when displayed. Versions 9.13.10 and 10.2.0 contain a fix for the issue.
Published: 2026-01-27
Score: 7.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting in Scheduler LogNotes
Action: Apply Patch
AI Analysis

Impact

The vulnerability permits an attacker to store malicious JavaScript in the Scheduler LogNotes field of the DNN platform. When the notes are displayed in the PersonaBar interface, the script executes in the context of the logged‑in user, enabling arbitrary code execution, data exfiltration, or defacement. This stored cross‑site scripting (CWE‑79) carries a CVSS base score of 7.7, indicating a high impact if exploited.

Affected Systems

Affected releases are DNN Platform versions 9.0.0 through 9.13.9 and all earlier 10.x releases prior to 10.2.0. The vendor issued a fix in version 9.13.10 and 10.2.0, which removes the ability to inject script into LogNotes.

Risk and Exploitability

The flaw requires the attacker to write a log note via the admin scheduler, so it is limited to users with sufficient privileges, typically administrators. The exploit probability, measured by EPSS, is below 1%, and the vulnerability is not currently listed in CISA’s KEV catalog. Nevertheless, because the execution context is syndicable, a privileged attacker can hijack sessions or perform phishing attacks within the CMS. The relatively low exploitation likelihood mitigates risk, but the potential impact remains significant for sites where scheduler notes are edited by trusted staff.

Generated by OpenCVE AI on April 18, 2026 at 01:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade DNN Platform to at least version 9.13.10 or 10.2.0, which removes the vulnerability.
  • Restrict Scheduler LogNotes editing rights to trusted administrative accounts only.
  • If an immediate upgrade is not feasible, disable or sanitize rich‑text input for LogNotes, or temporarily strip script tags via configuration.

Generated by OpenCVE AI on April 18, 2026 at 01:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-2g5g-hcgh-q3rp DotNetNuke.Core Vulnerable to Stored XSS in Scheduler LogNotes
History

Wed, 04 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Dnnsoftware dotnetnuke
CPEs cpe:2.3:a:dnnsoftware:dotnetnuke:*:*:*:*:*:*:*:*
Vendors & Products Dnnsoftware dotnetnuke

Wed, 28 Jan 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 28 Jan 2026 12:30:00 +0000

Type Values Removed Values Added
First Time appeared Dnnsoftware
Dnnsoftware dnn Platform
Vendors & Products Dnnsoftware
Dnnsoftware dnn Platform

Wed, 28 Jan 2026 00:00:00 +0000

Type Values Removed Values Added
Description DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. Starting in version 9.0.0 and prior to versions 9.13.10 and 10.2.0, extensions could write richtext in log notes which can include scripts that would run in the PersonaBar when displayed. Versions 9.13.10 and 10.2.0 contain a fix for the issue.
Title DotNetNuke.Core Vulnerable to Stored XSS in Scheduler LogNotes
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 7.7, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H'}


Subscriptions

Dnnsoftware Dnn Platform Dotnetnuke
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-01-28T21:04:11.758Z

Reserved: 2026-01-27T14:51:03.058Z

Link: CVE-2026-24836

cve-icon Vulnrichment

Updated: 2026-01-28T21:04:07.720Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-28T00:15:50.910

Modified: 2026-02-04T20:11:52.630

Link: CVE-2026-24836

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T02:00:10Z

Weaknesses