Server-Side Request Forgery (SSRF) in DotNetNuke.Core
Description
DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. A bypass has been identified for the previously known vulnerability CVE-2017-0929, allowing unauthenticated attackers to execute arbitrary GET requests against target systems, including internal or adjacent networks. This vulnerability facilitates a semi-blind SSRF attack, allowing attackers to make the target server send requests to internal or external URLs without viewing the full responses. Potential impacts include internal network reconnaissance, bypassing firewalls. This vulnerability is fixed in 9.13.8.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
DotNetNuke.CoreNuGet | < 9.13.8 | 9.13.8 |
Affected products
1- Range: < 9.13.8
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-3f7v-qx94-666mghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2025-32372ghsaADVISORY
- github.com/dnnsoftware/Dnn.Platform/commit/4721dd9eef846936d3b1a3676499e46968d15febghsax_refsource_MISCWEB
- github.com/dnnsoftware/Dnn.Platform/security/advisories/GHSA-3f7v-qx94-666mghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.