Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-64095 PoC — DNN 代码问题漏洞

Source
Associated Vulnerability
Title:DNN 代码问题漏洞 (CVE-2025-64095)
Description:DNN(又名DotNetNuke)是美国DNN公司的一套由微软支持、基于ASP.NET平台的开源内容管理系统(CMS)。该系统具有易于安装、可扩展、功能丰富等特点。 DNN 10.1.1之前版本存在代码问题漏洞,该漏洞源于默认HTML编辑器允许未经验证的文件上传,可能导致网站篡改和跨站脚本攻击。
Readme
=== Description ===

DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. Prior to 10.1.1, the default HTML editor provider allows unauthenticated file uploads and images can overwrite existing files. An unauthenticated user can upload and replace existing files allowing defacing a website and combined with other issue, injection XSS payloads. This vulnerability is fixed in 10.1.1 (https://nvd.nist.gov/vuln/detail/CVE-2025-64095)




```bash
python PoC-CVE-2025-64095.py
Enter target URL (e.g. http://site.com):
```


File Snapshot

[4.0K] /data/pocs/c17b56192f1ea05a6b11da4b094367b9771f1b23 ├── [6.5K] CVE-2025-64095.py └── [ 579] README.md 1 directory, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.