VYPR
High severityNVD Advisory· Published Feb 24, 2020· Updated Aug 4, 2024

CVE-2020-5187

CVE-2020-5187

Description

DNN (formerly DotNetNuke) through 9.4.4 allows Path Traversal (issue 2 of 2).

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

DNN (DotNetNuke) through 9.4.4 allows path traversal, enabling unauthorized file access.

Vulnerability

Description

CVE-2020-5187 is a path traversal vulnerability in DNN (formerly DotNetNuke) affecting versions through 9.4.4. The vulnerability arises from insufficient input validation when handling file paths, allowing an attacker to traverse outside the intended directory. This is the second of two path traversal issues reported for this platform [1].

Exploitation

An attacker can exploit this vulnerability by sending specially crafted requests containing directory traversal sequences (e.g., ../) to vulnerable endpoints. No authentication is required, making the attack surface broad. The flaw can be triggered remotely over the network without special privileges [3].

Impact

Successful exploitation allows an attacker to read arbitrary files on the server, potentially exposing sensitive configuration files, user data, or application source code. This can lead to further compromise of the system or data breaches.

Mitigation

The vendor has addressed this issue in later releases. Administrators should upgrade to a version beyond 9.4.4. As of the latest release, DNN 10.3.2 includes fixes for this and other vulnerabilities [1].

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
DotNetNuke.CoreNuGet
< 9.5.09.5.0

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.