{"vulnerability": "cve-2025-32035", "sightings": [{"uuid": "f10abd56-3fab-45ec-8d96-339aa472b680", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-32035", "type": "seen", "source": "https://t.me/cvedetector/22511", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-32035 - DotNetNuke File Upload Validation Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-32035 \nPublished : April 8, 2025, 6:16 p.m. | 1\u00a0hour, 18\u00a0minutes ago \nDescription : DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. Prior to 9.13.2, when uploading files (e.g. when uploading assets), the file extension is checked to see if it's an allowed file type but the actual contents of the file aren't checked. This means that it's possible to e.g. upload an executable file renamed to be a .jpg. This file could then be executed by another security vulnerability. This vulnerability is fixed in 9.13.2. \nSeverity: 2.6 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-08T22:22:34.000000Z"}]}