CVE-2025-32372:
DotNetNuke.Core Vulnerable to Server-Side Request Forgery (SSRF)
6.5
CVSS ScoreBasic Information
CVE ID
GHSA ID
EPSS Score
-
CWE
Published
4/9/2025
Updated
4/9/2025
KEV Status
No
Technology
C#
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
DotNetNuke.Core | nuget | < 9.13.8 | 9.13.8 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability is an SSRF in the DnnImageHandler. The commit 4721dd9eef846936d3b1a3676499e46968d15feb
addresses this by hardening the URL validation.
- The
DnnImageHandler.GenerateImage
method is the entry point that receives and processes the URL from user input (passed inparameters["Url"]
). It was vulnerable because it relied on an inadequate validation mechanism. - The
DnnImageHandler.UriBelongsToSite
method (a private static method withinDnnImageHandler
before the patch) was responsible for the actual URL validation. The patch removes this method entirely and replaces its functionality with a new, separateUriValidator
class and itsUriBelongsToSite
method. This indicates that the originalDnnImageHandler.UriBelongsToSite
method contained the flawed logic that led to the SSRF vulnerability. Both functions would be involved during the exploitation of the vulnerability:GenerateImage
as the function processing the malicious input, and the originalUriBelongsToSite
as the function performing the failed validation.