Web Content Management Platform Vulnerability in DNN by DNN Corporation
CVE-2025-52488
Key Information:
- Vendor
Dnnsoftware
- Status
- Vendor
- CVE Published:
- 21 June 2025
Badges
What is CVE-2025-52488?
CVE-2025-52488 is a vulnerability found in the DNN platform, a widely used open-source web content management system built on the Microsoft technology stack. Specifically affecting DNN versions from 6.0.0 up to but not including 10.0.1, this vulnerability allows for a series of malicious interactions that could potentially expose NTLM (NT LAN Manager) hashes to a third-party SMB (Server Message Block) server. Such exposure can enable attackers to gain unauthorized access to sensitive information associated with user accounts within the system. Given that DNN is commonly deployed for building and managing web applications and sites, the implications of this vulnerability could be substantial—leading to credential theft and unauthorized access to organizational resources.
Potential impact of CVE-2025-52488
-
Credential Exposure: The primary risk associated with CVE-2025-52488 is the potential exposure of NTLM hashes, which are critical for authenticating users. If these hashes are intercepted, attackers can launch further attacks, including leveraging the hashes to authenticate as legitimate users within the DNN platform.
-
Unauthorized System Access: With the compromised NTLM hashes, attackers could gain unauthorized access to systems and data within an organization. This could facilitate a range of malicious activities, such as data theft, alteration of web content, or installation of malware.
-
Increased Attack Surface: The vulnerability adds a layer of complexity to security management, as organizations using DNN may now have to improve their defenses and incident response strategies. Failure to patch this vulnerability could lead to further exploitation attempts, increasing the overall attack surface of the organization and highlighting the need for ongoing security assessments and updates.
Affected Version(s)
Dnn.Platform >= 6.0.0, < 10.0.1
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
News Articles

Critical DNN Vulnerability: Unicode Normalization Bypass Leads to NTLM Hijack
Despite significant security hardening, a new vulnerability was recently uncovered, demonstrating how intricate interactions between Windows
1 week ago

DNN Vulnerability Exposes NTLM Credentials via Unicode Normalization Bypass
A critical vulnerability,CVE-2025-52488, in DNN (formerly DotNetNuke), one of the oldest open-source content management systems.
1 week ago

Searchlight Cyber Uncovers High-Severity Vulnerability in Open-Source Web Content Management Platform, DNN › Searchlight Cyber
The vulnerability discovered by Searchlight Cyber researchers in DNN is present in multiple software versions (6.0.0 - 10.0.1) and has a severity score of 8.6
1 week ago
References
EPSS Score
8% chance of being exploited in the next 30 days.
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 📈
Vulnerability started trending
- 👾
Exploit known to exist
- 📰
First article discovered by VulDB
Vulnerability published
Vulnerability Reserved