Miggo Logo

CVE-2025-64095: DNN Insufficient Access Control - Image Upload allows for Site Content Overwrite

10

CVSS Score
3.1

Basic Information

EPSS Score
0.19014%
Published
10/29/2025
Updated
10/29/2025
KEV Status
No
Technology
TechnologyC#

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
DNN.PLATFORMnuget< 10.1.110.1.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability allows unauthenticated users to upload and overwrite files. The security advisory and the patch point to the CKEditor provider as the source of the vulnerability. The patch, found in commit 6497d3c35217e6e62e50d3ed7c8809eb69e3d06b, modifies the DNNConnect.CKEditorProvider.dnn manifest file to add authorization rules to the web.config. These rules deny anonymous users (<deny users="?" />) access to two specific endpoints: Providers/HtmlEditorProviders/DNNConnect.CKE/Browser/FileUploader.ashx and Providers/HtmlEditorProviders/DNNConnect.CKE/Browser/Browser.aspx. This indicates that these two endpoints were the entry points for the vulnerable functionality.

FileUploader.ashx is an ASP.NET web handler. Its content (<%@ WebHandler Language="C#" CodeBehind="FileUploader.ashx.cs" Class="DNNConnect.CKEditorProvider.Browser.FileUploader" %>) shows that the class DNNConnect.CKEditorProvider.Browser.FileUploader handles the requests. The entry point for a web handler is the ProcessRequest method. This method was processing file uploads without checking if the user was authenticated.

Browser.aspx is an ASP.NET web page, likely a file browser. The patch also restricts access to this page. The entry point for an ASP.NET page is the Page_Load event. The class name is inferred to be DNNConnect.CKEditorProvider.Browser.Browser based on the file name and the namespace of the other class. This page likely contained functionality to manage files, which was accessible to unauthenticated users.

The vulnerable functions are the entry points of these two components, as they failed to perform the necessary authentication checks before allowing access to file management functionality.

Vulnerable functions

DNNConnect.CKEditorProvider.Browser.FileUploader.ProcessRequest
DNN Platform/Providers/HtmlEditorProviders/DNNConnect.CKE/Browser/FileUploader.ashx.cs
This function, which handles file uploads, was accessible to unauthenticated users, allowing them to upload and overwrite files on the server. The vulnerability is a lack of an authentication check before processing the upload request.
DNNConnect.CKEditorProvider.Browser.Browser.Page_Load
DNN Platform/Providers/HtmlEditorProviders/DNNConnect.CKE/Browser/Browser.aspx.cs
This function, which is the entry point for the file browser page, was accessible to unauthenticated users. This allowed them to access file management functionality, including potentially uploading or overwriting files, without proper authorization. The vulnerability is the lack of an authentication check when the page is loaded.

WAF Protection Rules

WAF Rule

### Summ*ry T** ****ult *TML **itor provi**r *llows un*ut**nti**t** *il* uplo**s *n* im***s **n ov*rwrit* *xistin* *il*s. ### **s*ription *n un*ut**nti**t** us*r **n uplo** *n* r*pl*** *xistin* *il*s *llowin* *****in* * w**sit* *n* *om*in** wit* ot*

Reasoning

T** vuln*r**ility *llows un*ut**nti**t** us*rs to uplo** *n* ov*rwrit* *il*s. T** s**urity **visory *n* t** p*t** point to t** *K**itor provi**r *s t** sour** o* t** vuln*r**ility. T** p*t**, *oun* in *ommit `****************************************`