CVE-2025-52488

HIGH
8.6
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
None
Availability
None

Lifecycle Timeline

4
Patch Released
Mar 31, 2026 - 21:13 nvd
Patch available
Analysis Generated
Mar 15, 2026 - 21:35 vuln.today
PoC Detected
Sep 15, 2025 - 15:21 vuln.today
Public exploit code
CVE Published
Jun 21, 2025 - 03:15 nvd
HIGH 8.6

Description

DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. In versions 6.0.0 to before 10.0.1, DNN.PLATFORM allows a specially crafted series of malicious interaction to potentially expose NTLM hashes to a third party SMB server. This issue has been patched in version 10.0.1.

Analysis

DNN (DotNetNuke) CMS versions 6.0.0 through 10.0.0 contain a vulnerability that can expose NTLM hashes to a third-party SMB server. Through a specially crafted series of interactions, an attacker can force the DNN server to authenticate to an attacker-controlled SMB server, capturing NTLM credential hashes for offline cracking.

Technical Context

The vulnerability allows an attacker to trigger the DNN server to make an outbound SMB connection to an attacker-controlled server. Windows automatically sends NTLM authentication credentials during SMB connections. The attacker captures the NTLMv2 hash and cracks it offline using tools like hashcat, recovering the service account's plaintext password.

Affected Products

['DNN 6.0.0 through 10.0.0', 'DotNetNuke']

Remediation

Update to DNN 10.0.1 or later. Block outbound SMB (port 445) from web servers. Use a local service account (not domain account) for the IIS application pool. Implement SMB signing.

Priority Score

78
Low Medium High Critical
KEV: 0
EPSS: +14.8
CVSS: +43
POC: +20

Share

CVE-2025-52488 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy