Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
dotnetnuke Vendor: dnnsoftware

About This Product

dotnetnuke is a software product offered by dnnsoftware. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The moderate vulnerability count reflects ongoing security research and responsible disclosure practices. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 45 known vulnerabilities affecting dnnsoftware dotnetnuke. This includes 3 critical-severity issues and 12 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2017 to 2026, indicating a sustained research interest and ongoing security attention. 27 medium-severity issues and 3 low-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2017-9822 2017-07-20 2025-10-22 8.8 6.5 Likely
CVE-2017-0929 2018-07-03 2024-11-21 7.5 5.0 Likely
CVE-2018-14486 2019-03-21 2024-11-21 6.1 4.3 Likely
CVE-2018-15811 2019-07-03 2025-11-07 7.5 5.0 Likely
CVE-2018-15812 2019-07-03 2024-11-21 7.5 5.0 Likely
CVE-2018-18325 2019-07-03 2025-11-07 7.5 5.0 Likely
CVE-2018-18326 2019-07-03 2024-11-21 7.5 5.0 Likely
CVE-2019-12562 2019-09-26 2024-11-21 6.1 4.3 Likely
CVE-2020-5186 2020-02-24 2024-11-21 5.4 3.5 Unknown
CVE-2020-5187 2020-02-24 2024-11-21 8.8 6.5 Likely
CVE-2020-5188 2020-02-24 2024-11-21 6.5 4.0 Likely
CVE-2020-11585 2020-04-06 2024-11-21 4.3 4.0 Likely
CVE-2021-40186 2022-06-02 2024-11-21 6.5 5.0 Likely
CVE-2021-31858 2022-07-20 2024-11-21 5.4 - -
CVE-2022-2922 2022-09-30 2024-11-21 4.9 - -
CVE-2022-47053 2023-04-12 2025-02-10 5.4 - -
CVE-2025-32035 2025-04-08 2025-08-26 2.6 - -
CVE-2025-32036 2025-04-08 2025-08-26 4.2 - -
CVE-2025-32371 2025-04-09 2025-08-26 4.3 - -
CVE-2025-32372 2025-04-09 2025-08-26 6.5 - -
CVE-2025-32373 2025-04-09 2025-08-26 6.5 - -
CVE-2025-32374 2025-04-09 2025-08-26 5.9 - -
CVE-2025-48376 2025-05-23 2025-08-26 3.5 - -
CVE-2025-48377 2025-05-23 2025-08-26 5.4 - -
CVE-2025-48378 2025-05-23 2025-08-26 5.4 - -
CVE-2025-52485 2025-06-21 2025-09-15 5.4 - -
CVE-2025-52486 2025-06-21 2025-09-15 6.1 - -
CVE-2025-52487 2025-06-21 2025-09-15 7.5 - -
CVE-2025-52488 2025-06-21 2025-09-15 8.6 - -
CVE-2025-59535 2025-09-22 2025-09-29 6.5 - -
CVE-2025-59539 2025-09-23 2025-09-29 6.3 - -
CVE-2025-59545 2025-09-23 2025-09-29 9.0 - -
CVE-2025-59546 2025-09-23 2025-09-29 2.4 - -
CVE-2025-59547 2025-09-23 2025-09-29 5.3 - -
CVE-2025-59548 2025-09-23 2025-09-29 6.1 - -
CVE-2025-59821 2025-09-23 2025-09-29 6.5 - -
CVE-2025-62802 2025-10-28 2025-11-03 4.3 - -
CVE-2025-64094 2025-10-28 2025-11-03 6.4 - -
CVE-2025-64095 2025-10-28 2025-11-03 10.0 - -
CVE-2026-24784 2026-01-28 2026-02-04 6.8 - -
CVE-2026-24833 2026-01-28 2026-02-04 7.6 - -
CVE-2026-24836 2026-01-28 2026-02-04 7.6 - -
CVE-2026-24837 2026-01-28 2026-02-04 7.6 - -
CVE-2026-24838 2026-01-28 2026-02-04 9.1 - -
CVE-2020-37103 2026-02-03 2026-02-09 6.4 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for dnnsoftware dotnetnuke by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.