Version 5.2.14
Plone
The Plone Content Management System
Install Instructions
pip install Plone
Current Version Release Date September 05, 2024
Language Python
Package URL (purl) pkg:pip/Plone@5.2.14
Find Plone
vulnerabilities in your supply chain.
Plone Vulnerabilities
Sort by
CVE (Latest)
CVE | CVSS Score | CWE(s) | EPSS Score | EPSS % | Impacted Versions |
---|---|---|---|---|---|
CVE-2011-1948 | Medium 4.3 | CWE-79 | 0.00292 | 0.69847 |
|
CVE-2011-1949 | Low 3.5 | CWE-79 | 0.00119 | 0.47391 |
|
CVE-2011-4030 | High 8.8 | CWE-264 | 0.00769 | 0.81849 |
|
CVE-2011-4462 | Medium 5.3 | CWE-20 | 0.01871 | 0.88861 |
|
CVE-2012-5485 | Medium 6.8 | CWE-94 | 0.0106 | 0.84687 |
|
CVE-2012-5486 | Medium 6.4 | 0.01168 | 0.85511 |
|
|
CVE-2012-5487 | High 8.5 | CWE-264 | 0.0026 | 0.66503 |
|
CVE-2012-5488 | Medium 5.3 | CWE-94 | 0.01168 | 0.85511 |
|
CVE-2012-5489 | Medium 6.5 | CWE-264 | 0.00319 | 0.71228 |
|
CVE-2012-5490 | Medium 4.3 | CWE-79 | 0.0022 | 0.6082 |
|
CVE-2012-5491 | Medium 4.3 | CWE-200 | 0.00358 | 0.72884 |
|
CVE-2012-5492 | Medium 5.3 | CWE-200 | 0.00358 | 0.72884 |
|
CVE-2012-5493 | High 8.5 | CWE-94 | 0.00332 | 0.71861 |
|
CVE-2012-5494 | Medium 4.3 | CWE-79 | 0.0022 | 0.6082 |
|
CVE-2012-5495 | Medium 5.3 | CWE-94 | 0.00825 | 0.82528 |
|
CVE-2012-5497 | Medium 5.3 | CWE-200 | 0.00525 | 0.77562 |
|
CVE-2012-5498 | Medium 5.3 | CWE-264 | 0.02432 | 0.90347 |
|
CVE-2012-5499 | Medium 5.3 | CWE-399 | 0.01282 | 0.86282 |
|
CVE-2012-5500 | Medium 4.3 | CWE-352 | 0.00243 | 0.64994 |
|
CVE-2012-5501 | Medium 5.3 | CWE-264 | 0.00331 | 0.71792 |
|
CVE-2012-5502 | Low 3.5 | CWE-79 | 0.00102 | 0.43066 |
|
CVE-2012-5503 | Medium 5.3 | CWE-200 | 0.00358 | 0.72884 |
|
CVE-2012-5504 | Medium 4.3 | CWE-79 | 0.0022 | 0.6082 |
|
CVE-2012-5505 | Medium 5.3 | CWE-200 | 0.00358 | 0.72884 |
|
CVE-2012-5506 | Medium 5.3 | CWE-399 | 0.00874 | 0.83034 |
|
CVE-2012-5507 | Medium 4.3 | CWE-362 | 0.00429 | 0.75149 |
|
CVE-2012-5508 | Medium 5.3 | CWE-200 | 0.00742 | 0.81454 |
|
CVE-2012-6661 | Medium 5 | CWE-310 | 0.00432 | 0.75238 |
|
CVE-2013-4188 | Medium 4.3 | CWE-399 | 0.00874 | 0.83034 |
|
CVE-2013-4189 | Medium 6.5 | CWE-284 | 0.00332 | 0.71861 |
|
CVE-2013-4190 | Medium 4.3 | CWE-79 | 0.0022 | 0.6082 |
|
CVE-2013-4191 | Medium 5.8 | CWE-264 | 0.00331 | 0.71792 |
|
CVE-2013-4192 | Medium 4.3 | CWE-20 | 0.00131 | 0.4944 |
|
CVE-2013-4193 | Medium 4.3 | CWE-264 | 0.00313 | 0.70903 |
|
CVE-2013-4194 | Medium 4.3 | CWE-200 | 0.00358 | 0.72884 |
|
CVE-2013-4195 | Medium 5.8 | CWE-20 | 0.0028 | 0.69141 |
|
CVE-2013-4196 | Medium 5.3 | CWE-264 | 0.00331 | 0.71792 |
|
CVE-2013-4197 | Medium 5.5 | CWE-20 | 0.00131 | 0.4944 |
|
CVE-2013-4198 | Medium 4.3 | CWE-264 | 0.00122 | 0.47987 |
|
CVE-2013-4199 | Low 3.5 | CWE-20 | 0.02246 | 0.89925 |
|
CVE-2013-4200 | Medium 5.8 | CWE-264 | 0.04274 | 0.92552 |
|
CVE-2013-7060 | Medium 5.3 | CWE-200 | 0.00313 | 0.70889 |
|
CVE-2013-7061 | Medium 5.5 | CWE-264, CWE-285 | 0.00078 | 0.35359 |
|
CVE-2015-7293 | High 8.8 | CWE-352 | 0.00301 | 0.70251 |
|
CVE-2015-7317 | Medium 6.8 | CWE-264, CWE-284 | 0.00175 | 0.55736 |
|
CVE-2015-7318 | High 7.5 | CWE-20, CWE-113 | 0.00326 | 0.71527 |
|
CVE-2016-4041 | High 7.3 | CWE-264, CWE-284 | 0.0018 | 0.56245 |
|
CVE-2016-4042 | Medium 5.3 | CWE-200 | 0.00168 | 0.54583 |
|
CVE-2016-7137 | Medium 6.1 | CWE-601 | 0.00338 | 0.72066 |
|
CVE-2016-7138 | Medium 6.1 | CWE-79 | 0.00247 | 0.65359 |
|
CVE-2016-7139 | Medium 6.1 | CWE-79 | 0.00247 | 0.65359 |
|
CVE-2016-7140 | Medium 6.1 | CWE-79 | 0.00247 | 0.65359 |
|
CVE-2016-7147 | Medium 6.1 | CWE-79 | 0.00149 | 0.52103 |
|
CVE-2017-1000481 | Medium 6.1 | CWE-601 | 0.00089 | 0.39527 |
|
CVE-2017-1000482 | Medium 5.4 | CWE-79 | 0.00054 | 0.2325 |
|
CVE-2017-1000483 | Medium 6.5 | CWE-264, CWE-265 | 0.00065 | 0.30022 |
|
CVE-2017-1000484 | Medium 6.1 | CWE-601 | 0.00089 | 0.39527 |
|
CVE-2017-5524 | Medium 4.3 | CWE-264, CWE-134 | 0.00095 | 0.41466 |
|
CVE-2020-28734 | High 8.8 | CWE-611 | 0.00279 | 0.69055 |
|
CVE-2020-28735 | High 8.8 | CWE-918 | 0.00279 | 0.69055 |
|
CVE-2020-28736 | High 8.8 | CWE-611 | 0.00279 | 0.69055 |
|
CVE-2020-7936 | Medium 6.1 | CWE-601 | 0.00155 | 0.5288 |
|
CVE-2020-7939 | High 8.8 | CWE-89 | 0.00235 | 0.62222 |
|
CVE-2020-7941 | High 9.8 | CWE-269 | 0.00371 | 0.73355 |
|
CVE-2021-29002 | Medium 5.4 | CWE-79 | 0.00078 | 0.35361 |
|
CVE-2021-3313 | Medium 5.4 | CWE-79 | 0.00084 | 0.37372 |
|
CVE-2021-33507 | Medium 6.1 | CWE-79 | 0.00084 | 0.3737 |
|
CVE-2021-33508 | Medium 5.4 | CWE-79 | 0.00054 | 0.24322 |
|
CVE-2021-33509 | High 9.9 | CWE-732 | 0.00326 | 0.71524 |
|
CVE-2021-33510 | Medium 4.3 | CWE-918 | 0.00082 | 0.36564 |
|
CVE-2021-33511 | High 7.5 | CWE-918 | 0.00178 | 0.56024 |
|
CVE-2021-33512 | Medium 5.4 | CWE-79 | 0.00054 | 0.24322 |
|
CVE-2021-33513 | Medium 5.4 | CWE-79 | 0.00054 | 0.24322 |
|
CVE-2011-1950 | Medium 5.5 | CWE-264 | 0.00376 | 0.73516 |
|
CVE-2013-7062 | Medium 6.1 | CWE-79 | 0.00292 | 0.6983 |
|
CVE-2015-7315 | Medium 5.9 | CWE-286, CWE-284 | 0.00302 | 0.70309 |
|
CVE-2015-7316 | Medium 6.1 | CWE-79 | 0.00123 | 0.4811 |
|
CVE-2016-7135 | Medium 4.9 | CWE-200, CWE-22 | 0.00181 | 0.56491 |
|
CVE-2016-7136 | Medium 6.1 | CWE-79 | 0.00347 | 0.72424 |
|
CVE-2011-0720 | High 7.5 | CWE-264 | 0.01902 | 0.88982 |
|
CVE-2012-5496 | Medium 5.3 | CWE-399 | 0.00874 | 0.83034 |
|
CVE-2010-2422 | Medium 4.3 | CWE-79 | 0.00192 | 0.57871 |
|
CVE-2011-2528 | High 7.5 | CWE-265 | 0.00771 | 0.81868 |
|
CVE-2020-7940 | High 7.5 | CWE-521 | 0.00265 | 0.66803 |
|
CVE-2016-4043 | Medium 4.9 | CWE-264, CWE-284 | 0.00088 | 0.3926 |
|
CVE-2020-7937 | Medium 5.4 | CWE-79 | 0.00118 | 0.47323 |
|
CVE-2021-35959 | Medium 5.4 | CWE-79 | 0.00054 | 0.24322 |
|
CVE-2020-7938 | High 8.8 | CWE-269 | 0.00253 | 0.65842 |
|
Plone Vulnerability Remediation Guidance
CVE | Description | Full list of Impacted Versions | Fix |
---|---|---|---|
CVE-2021-35959 | In Plone 5.0 through 5.2.4, Editors are vulnerable to XSS in the folder contents view, if a Contributor has created a folder with a SCRIPT tag in the description field. | 5.0.3, 5.0.5, 5.0.7, 5.0.10, 5.0.8, 5.0, 5.1a1, 5.0.1 (Show all) | Patch → NO_SAFE_VERSION |
CVE-2021-33513 | Plone through 5.2.4 allows XSS via the inline_diff methods in Products.CMFDiffTool. | 4.1rc3, 4.1, 4.1rc2, 4.1b2, 4.1b1, 4.1a2, 4.0rc1, 4.0b5 (Show all) | Patch → NO_SAFE_VERSION |
CVE-2021-33512 | Plone through 5.2.4 allows stored XSS attacks (by a Contributor) by uploading an SVG or HTML document. | 4.1rc3, 4.1, 4.1rc2, 4.1b2, 4.1b1, 4.1a2, 4.0rc1, 4.0b5 (Show all) | Patch → NO_SAFE_VERSION |
CVE-2021-33511 | Plone though 5.2.4 allows SSRF via the lxml parser. This affects Diazo themes, Dexterity TTW schemas, and modeleditors in plone.app.theming, plone.app.dexterity, and plone.supermodel. | 4.1rc3, 4.1, 4.1rc2, 4.1b2, 4.1b1, 4.1a2, 4.0rc1, 4.0b5 (Show all) | Patch → NO_SAFE_VERSION |
CVE-2021-33510 | Plone through 5.2.4 allows remote authenticated managers to conduct SSRF attacks via an event ical URL, to read one line of a file. | 4.1rc3, 4.1, 4.1rc2, 4.1b2, 4.1b1, 4.1a2, 4.0rc1, 4.0b5 (Show all) | Patch → NO_SAFE_VERSION |
CVE-2021-33509 | Plone through 5.2.4 allows remote authenticated managers to perform disk I/O via crafted keyword arguments to the ReStructuredText transform in a Python script. | 4.1rc3, 4.1, 4.1rc2, 4.1b2, 4.1b1, 4.1a2, 4.0rc1, 4.0b5 (Show all) | Patch → NO_SAFE_VERSION |
CVE-2021-33508 | Plone through 5.2.4 allows XSS via a full name that is mishandled during rendering of the ownership tab of a content item. | 4.1rc3, 4.1, 4.1rc2, 4.1b2, 4.1b1, 4.1a2, 4.0rc1, 4.0b5 (Show all) | Patch → NO_SAFE_VERSION |
CVE-2021-33507 | Zope Products.CMFCore before 2.5.1 and Products.PluggableAuthService before 2.6.2, as used in Plone through 5.2.4 and other products, allow Reflected XSS. | 4.1rc3, 4.1, 4.1rc2, 4.1b2, 4.1b1, 4.1a2, 4.0rc1, 4.0b5 (Show all) | Patch → NO_SAFE_VERSION |
CVE-2021-3313 | Plone CMS until version 5.2.4 has a stored Cross-Site Scripting (XSS) vulnerability in the user fullname property and the file upload functionality. The user's input data is not properly encoded when being echoed back to the user. This data can be interpreted as executable code by the browser and allows an attacker to execute JavaScript in the context of the victim's browser if the victim opens a vulnerable page containing an XSS payload. | 4.1rc3, 4.1, 4.1rc2, 4.1b2, 4.1b1, 4.1a2, 4.0rc1, 4.0b5 (Show all) | Patch → NO_SAFE_VERSION |
CVE-2021-29002 | A stored cross-site scripting (XSS) vulnerability in Plone CMS 5.2.3 exists in site-controlpanel via the "form.widgets.site_title" parameter. | 4.1rc3, 4.1, 4.1rc2, 4.1b2, 4.1b1, 4.1a2, 4.0rc1, 4.0b5 (Show all) | Patch → NO_SAFE_VERSION |
CVE-2020-7941 | A privilege escalation issue in plone.app.contenttypes in Plone 4.3 through 5.2.1 allows users to PUT (overwrite) some content without needing write permission. | 4.1rc3, 4.1, 4.1rc2, 4.1b2, 4.1b1, 4.1a2, 4.0rc1, 4.0b5 (Show all) | Patch → NO_SAFE_VERSION |
CVE-2020-7940 | Missing password strength checks on some forms in Plone 4.3 through 5.2.0 allow users to set weak passwords, leading to easier cracking. | 4.3, 4.3.1, 5.0b4, 5.0rc1, 5.0b2, 5.0b3, 5.0b1, 5.0a3 (Show all) | Patch → NO_SAFE_VERSION |
CVE-2020-7939 | SQL Injection in DTML or in connection objects in Plone 4.0 through 5.2.1 allows users to perform unwanted SQL queries. (This is a problem in Zope.) | 4.1rc3, 4.1, 4.1rc2, 4.1b2, 4.1b1, 4.1a2, 4.0rc1, 4.0b5 (Show all) | Patch → NO_SAFE_VERSION |
CVE-2020-7938 | plone.restapi in Plone 5.2.0 through 5.2.1 allows users with a certain privilege level to escalate their privileges up to the highest level. | 5.2.0, 5.2.1 | Patch → NO_SAFE_VERSION |
CVE-2020-7937 | An XSS issue in the title field in Plone 5.0 through 5.2.1 allows users with a certain privilege level to insert JavaScript that will be executed when other users access the site. | 5.0.3, 5.0.5, 5.0.7, 5.0.10, 5.0.8, 5.0, 5.1a1, 5.0.1 (Show all) | Patch → NO_SAFE_VERSION |
CVE-2020-7936 | An open redirect on the login form (and possibly other places) in Plone 4.0 through 5.2.1 allows an attacker to craft a link to a Plone Site that, when followed, and possibly after login, will redirect to an attacker's site. | 4.1rc3, 4.1, 4.1rc2, 4.1b2, 4.1b1, 4.1a2, 4.0rc1, 4.0b5 (Show all) | Patch → NO_SAFE_VERSION |
CVE-2020-28736 | Plone before 5.2.3 allows XXE attacks via a feature that is protected by an unapplied permission of plone.schemaeditor.ManageSchemata (therefore, only available to the Manager role). | 4.1rc3, 4.1, 4.1rc2, 4.1b2, 4.1b1, 4.1a2, 4.0rc1, 4.0b5 (Show all) | Patch → NO_SAFE_VERSION |
CVE-2020-28735 | Plone before 5.2.3 allows SSRF attacks via the tracebacks feature (only available to the Manager role). | 4.1rc3, 4.1, 4.1rc2, 4.1b2, 4.1b1, 4.1a2, 4.0rc1, 4.0b5 (Show all) | Patch → NO_SAFE_VERSION |
CVE-2020-28734 | Plone before 5.2.3 allows XXE attacks via a feature that is explicitly only available to the Manager role. | 4.1rc3, 4.1, 4.1rc2, 4.1b2, 4.1b1, 4.1a2, 4.0rc1, 4.0b5 (Show all) | Patch → NO_SAFE_VERSION |
CVE-2017-5524 | Plone 4.x through 4.3.11 and 5.x through 5.0.6 allow remote attackers to bypass a sandbox protection mechanism and obtain sensitive information by leveraging the Python string format method. | 4.1rc3, 4.1, 4.1rc2, 4.1b2, 4.1b1, 4.1a2, 4.0rc1, 4.0b5 (Show all) | Patch → NO_SAFE_VERSION |
CVE-2017-1000484 | By linking to a specific url in Plone 2.5-5.1rc1 with a parameter, an attacker could send you to his own website. On its own this is not so bad: the attacker could more easily link directly to his own website instead. But in combination with another attack, you could be sent to the Plone login form and login, then get redirected to the specific url, and then get a second redirect to the attacker website. (The specific url can be seen by inspecting the hotfix code, but we don't want to make it too easy for attackers by spelling it out here.) | 4.1rc3, 4.1, 4.1rc2, 4.1b2, 4.1b1, 4.1a2, 4.0rc1, 4.0b5 (Show all) | Patch → NO_SAFE_VERSION |
CVE-2017-1000483 | Accessing private content via str.format in through-the-web templates and scripts in Plone 2.5-5.1rc1. This improves an earlier hotfix. Since the format method was introduced in Python 2.6, this part of the hotfix is only relevant for Plone 4 and 5. | 4.1rc3, 4.1, 4.1rc2, 4.1b2, 4.1b1, 4.1a2, 4.0rc1, 4.0b5 (Show all) | Patch → NO_SAFE_VERSION |
CVE-2017-1000482 | A member of the Plone 2.5-5.1rc1 site could set javascript in the home_page property of his profile, and have this executed when a visitor click the home page link on the author page. | 4.1rc3, 4.1, 4.1rc2, 4.1b2, 4.1b1, 4.1a2, 4.0rc1, 4.0b5 (Show all) | Patch → NO_SAFE_VERSION |
CVE-2017-1000481 | When you visit a page where you need to login, Plone 2.5-5.1rc1 sends you to the login form with a 'came_from' parameter set to the previous url. After you login, you get redirected to the page you tried to view before. An attacker might try to abuse this by letting you click on a specially crafted link. You would login, and get redirected to the site of the attacker, letting you think that you are still on the original Plone site. Or some javascript of the attacker could be executed. Most of these types of attacks are already blocked by Plone, using the `isURLInPortal` check to make sure we only redirect to a page on the same Plone site. But a few more ways of tricking Plone into accepting a malicious link were discovered, and fixed with this hotfix. | 4.1rc3, 4.1, 4.1rc2, 4.1b2, 4.1b1, 4.1a2, 4.0rc1, 4.0b5 (Show all) | Patch → NO_SAFE_VERSION |
CVE-2016-7147 | Cross-site scripting (XSS) vulnerability in the manage_findResult component in the search feature in Zope ZMI in Plone before 4.3.12 and 5.x before 5.0.7 allows remote attackers to inject arbitrary web script or HTML via vectors involving double quotes, as demonstrated by the obj_ids:tokens parameter. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-7140. | 4.1rc3, 4.1, 4.1rc2, 4.1b2, 4.1b1, 4.1a2, 4.0rc1, 4.0b5 (Show all) | Patch → NO_SAFE_VERSION |
CVE-2016-7140 | Multiple cross-site scripting (XSS) vulnerabilities in the ZMI page in Zope2 in Plone CMS 5.x through 5.0.6, 4.x through 4.3.11, and 3.3.x through 3.3.6 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors. | 4.1rc3, 4.1, 4.1rc2, 4.1b2, 4.1b1, 4.1a2, 4.1a3, 4.1a1 (Show all) | Patch → NO_SAFE_VERSION |
CVE-2016-7139 | Cross-site scripting (XSS) vulnerability in an unspecified page template in Plone CMS 5.x through 5.0.6, 4.x through 4.3.11, and 3.3.x through 3.3.6 allows remote attackers to inject arbitrary web script or HTML via unknown vectors. | 4.1rc3, 4.1, 4.1rc2, 4.1b2, 4.1b1, 4.1a2, 4.1a3, 4.1a1 (Show all) | Patch → NO_SAFE_VERSION |
CVE-2016-7138 | Cross-site scripting (XSS) vulnerability in the URL checking infrastructure in Plone CMS 5.x through 5.0.6, 4.x through 4.3.11, and 3.3.x through 3.3.6 allows remote attackers to inject arbitrary web script or HTML via a crafted URL. | 4.1rc3, 4.1, 4.1rc2, 4.1b2, 4.1b1, 4.1a2, 4.1a3, 4.1a1 (Show all) | Patch → NO_SAFE_VERSION |
CVE-2016-7137 | Multiple open redirect vulnerabilities in Plone CMS 5.x through 5.0.6, 4.x through 4.3.11, and 3.3.x through 3.3.6 allow remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the referer parameter to (1) %2b%2bgroupdashboard%2b%2bplone.dashboard1%2bgroup/%2b/portlets.Actions or (2) folder/%2b%2bcontextportlets%2b%2bplone.footerportlets/%2b /portlets.Actions or the (3) came_from parameter to /login_form. | 4.1rc3, 4.1, 4.1rc2, 4.1b2, 4.1b1, 4.1a2, 4.1a3, 4.1a1 (Show all) | Patch → NO_SAFE_VERSION |
CVE-2016-7136 | z3c.form in Plone CMS 5.x through 5.0.6 and 4.x through 4.3.11 allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted GET request. | 4.1, 4.0.1, 4.0.2, 4.0.4, 4.0.9, 4.0.10, 4.0.3, 4.0.8 (Show all) | Patch → NO_SAFE_VERSION |
CVE-2016-7135 | Directory traversal vulnerability in Plone CMS 5.x through 5.0.6 and 4.2.x through 4.3.11 allows remote administrators to read arbitrary files via a .. (dot dot) in the path parameter in a getFile action to Plone/++theme++barceloneta/@@plone.resourceeditor.filemanager-actions. | 4.1, 3.3, 4.0.1, 3.3.5, 3.3.4, 4.0.2, 4.0.4, 4.0.9 (Show all) | Patch → NO_SAFE_VERSION |
CVE-2016-4043 | Chameleon (five.pt) in Plone 5.0rc1 through 5.1a1 allows remote authenticated users to bypass Restricted Python by leveraging permissions to create or edit templates. | 5.0rc1, 5.0rc3, 5.0rc2, 5.0.3, 5.0.5, 5.0.7, 5.0.10, 5.0.8 (Show all) | Patch → NO_SAFE_VERSION |
CVE-2016-4042 | Plone 3.3 through 5.1a1 allows remote attackers to obtain information about the ID of sensitive content via unspecified vectors. | 4.1rc3, 4.1, 4.1rc2, 4.1b2, 4.1b1, 4.1a2, 4.0rc1, 4.0b5 (Show all) | Patch → NO_SAFE_VERSION |
CVE-2016-4041 | Plone 4.0 through 5.1a1 does not have security declarations for Dexterity content-related WebDAV requests, which allows remote attackers to gain webdav access via unspecified vectors. | 4.1rc3, 4.1, 4.1rc2, 4.1b2, 4.1b1, 4.1a2, 4.1a3, 4.1a1 (Show all) | Patch → NO_SAFE_VERSION |
CVE-2015-7318 | Plone 3.3.0 through 3.3.6 allows remote attackers to inject headers into HTTP responses. | 4.1rc3, 4.1, 4.1rc2, 4.1b2, 4.1b1, 4.1a2, 4.0rc1, 4.0b5 (Show all) | Patch → NO_SAFE_VERSION |
CVE-2015-7317 | Kupu 3.3.0 through 3.3.6, 4.0.0 through 4.0.10, 4.1.0 through 4.1.6, and 4.2.0 through 4.2.7 allows remote authenticated users to edit Kupu settings. | 4.1rc3, 4.1, 4.1rc2, 4.1b2, 4.1b1, 4.1a2, 4.0rc1, 4.0b5 (Show all) | Patch → NO_SAFE_VERSION |
CVE-2015-7316 | Cross-site scripting (XSS) vulnerability in Plone 3.3.0 through 3.3.6, 4.0.0 through 4.0.10, 4.1.0 through 4.1.6, 4.2.0 through 4.2.7, 4.3.x before 4.3.7, and 5.0rc1. | 4.1, 3.3, 4.0.1, 3.3.5, 3.3.4, 4.0.2, 4.0.4, 4.0.6 (Show all) | Patch → NO_SAFE_VERSION |
CVE-2015-7315 | Plone 3.3.0 through 3.3.6, 4.0.0 through 4.0.10, 4.1.0 through 4.1.6, 4.2.0 through 4.2.7, 4.3.0 through 4.3.6, and 5.0rc1 allows remote attackers to add a new member to a Plone site with registration enabled, without acknowledgment of site administrator. | 4.1, 3.3, 4.0.1, 3.3.5, 3.3.4, 4.0.2, 4.0.4, 4.0.6 (Show all) | Patch → NO_SAFE_VERSION |
CVE-2015-7293 | Multiple cross-site request forgery (CSRF) vulnerabilities in Zope Management Interface 4.3.7 and earlier, and Plone before 5.x. | 4.1rc3, 4.1, 4.1rc2, 4.1b2, 4.1b1, 4.1a2, 4.0rc1, 4.0b5 (Show all) | Patch → NO_SAFE_VERSION |
CVE-2013-7062 | Multiple cross-site scripting (XSS) vulnerabilities in Zope, as used in Plone 3.3.x through 3.3.6, 4.0.x through 4.0.9, 4.1.x through 4.1.6, 4.2.x through 4.2.7, and 4.3 through 4.3.2, allow remote attackers to inject arbitrary web script or HTML via unspecified input in the (1) browser_id_manager or (2) OFS.Image method. | 4.1, 3.3, 4.0.1, 3.3.5, 3.3.4, 4.0.2, 4.0.4, 4.0.6 (Show all) | Patch → NO_SAFE_VERSION |
CVE-2013-7061 | Products/CMFPlone/CatalogTool.py in Plone 3.3 through 4.3.2 allows remote administrators to bypass restrictions and obtain sensitive information via an unspecified search API. | 4.1rc3, 4.1, 4.1rc2, 4.1b2, 4.1b1, 4.1a2, 4.0rc1, 4.0b5 (Show all) | Patch → NO_SAFE_VERSION |
CVE-2013-7060 | Products/CMFPlone/FactoryTool.py in Plone 3.3 through 4.3.2 allows remote attackers to obtain the installation path via vectors related to a file object for unspecified documentation which is initialized in class scope. | 4.1rc3, 4.1, 4.1rc2, 4.1b2, 4.1b1, 4.1a2, 4.0rc1, 4.0b5 (Show all) | Patch → NO_SAFE_VERSION |
CVE-2013-4200 | The isURLInPortal method in the URLTool class in in_portal.py in Plone 2.1 through 4.1, 4.2.x through 4.2.5, and 4.3.x through 4.3.1 treats URLs starting with a space as a relative URL, which allows remote attackers to bypass the allow_external_login_sites filtering property, redirect users to arbitrary web sites, and conduct phishing attacks via a space before a URL in the "next" parameter to acl_users/credentials_cookie_auth/require_login. | 4.1rc3, 4.1, 4.1rc2, 4.1b2, 4.1b1, 4.1a2, 4.0rc1, 4.0b5 (Show all) | Patch → NO_SAFE_VERSION |
CVE-2013-4199 | (1) cb_decode.py and (2) linkintegrity.py in Plone 2.1 through 4.1, 4.2.x through 4.2.5, and 4.3.x through 4.3.1 allow remote authenticated users to cause a denial of service (resource consumption) via a large zip archive, which is expanded (decompressed). | 4.1rc3, 4.1, 4.1rc2, 4.1b2, 4.1b1, 4.1a2, 4.0rc1, 4.0b5 (Show all) | Patch → NO_SAFE_VERSION |
CVE-2013-4198 | mail_password.py in Plone 2.1 through 4.1, 4.2.x through 4.2.5, and 4.3.x through 4.3.1 allows remote authenticated users to bypass the prohibition on password changes via the forgotten password email functionality. | 4.1rc3, 4.1, 4.1rc2, 4.1b2, 4.1b1, 4.1a2, 4.0rc1, 4.0b5 (Show all) | Patch → NO_SAFE_VERSION |
CVE-2013-4197 | member_portrait.py in Plone 2.1 through 4.1, 4.2.x through 4.2.5, and 4.3.x through 4.3.1 allows remote authenticated users to modify or delete portraits of other users via unspecified vectors. | 4.1rc3, 4.1, 4.1rc2, 4.1b2, 4.1b1, 4.1a2, 4.0rc1, 4.0b5 (Show all) | Patch → NO_SAFE_VERSION |
CVE-2013-4196 | The object manager implementation (objectmanager.py) in Plone 2.1 through 4.1, 4.2.x through 4.2.5, and 4.3.x through 4.3.1 does not properly restrict access to internal methods, which allows remote attackers to obtain sensitive information via a crafted request. | 4.1rc3, 4.1, 4.1rc2, 4.1b2, 4.1b1, 4.1a2, 4.0rc1, 4.0b5 (Show all) | Patch → NO_SAFE_VERSION |
CVE-2013-4195 | Multiple open redirect vulnerabilities in (1) marmoset_patch.py, (2) publish.py, and (3) principiaredirect.py in Plone 2.1 through 4.1, 4.2.x through 4.2.5, and 4.3.x through 4.3.1 allow remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors. | 4.1rc3, 4.1, 4.1rc2, 4.1b2, 4.1b1, 4.1a2, 4.0rc1, 4.0b5 (Show all) | Patch → NO_SAFE_VERSION |
CVE-2013-4194 | The WYSIWYG component (wysiwyg.py) in Plone 2.1 through 4.1, 4.2.x through 4.2.5, and 4.3.x through 4.3.1 allows remote attackers to obtain sensitive information via a crafted URL, which reveals the installation path in an error message. | 4.1rc3, 4.1, 4.1rc2, 4.1b2, 4.1b1, 4.1a2, 4.0rc1, 4.0b5 (Show all) | Patch → NO_SAFE_VERSION |
CVE-2013-4193 | typeswidget.py in Plone 2.1 through 4.1, 4.2.x through 4.2.5, and 4.3.x through 4.3.1 does not properly enforce the immutable setting on unspecified content edit forms, which allows remote attackers to hide fields on the forms via a crafted URL. | 4.1rc3, 4.1, 4.1rc2, 4.1b2, 4.1b1, 4.1a2, 4.0rc1, 4.0b5 (Show all) | Patch → NO_SAFE_VERSION |
CVE-2013-4192 | sendto.py in Plone 2.1 through 4.1, 4.2.x through 4.2.5, and 4.3.x through 4.3.1 allows remote authenticated users to spoof emails via unspecified vectors. | 4.1rc3, 4.1, 4.1rc2, 4.1b2, 4.1b1, 4.1a2, 4.0rc1, 4.0b5 (Show all) | Patch → NO_SAFE_VERSION |
CVE-2013-4191 | zip.py in Plone 2.1 through 4.1, 4.2.x through 4.2.5, and 4.3.x through 4.3.1 does not properly enforce access restrictions when including content in a zip archive, which allows remote attackers to obtain sensitive information by reading a generated archive. | 4.1rc3, 4.1, 4.1rc2, 4.1b2, 4.1b1, 4.1a2, 4.0rc1, 4.0b5 (Show all) | Patch → NO_SAFE_VERSION |
CVE-2013-4190 | Multiple cross-site scripting (XSS) vulnerabilities in (1) spamProtect.py, (2) pts.py, and (3) request.py in Plone 2.1 through 4.1, 4.2.x through 4.2.5, and 4.3.x through 4.3.1 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors. | 4.1rc3, 4.1, 4.1rc2, 4.1b2, 4.1b1, 4.1a2, 4.0rc1, 4.0b5 (Show all) | Patch → NO_SAFE_VERSION |
CVE-2013-4189 | Multiple unspecified vulnerabilities in (1) dataitems.py, (2) get.py, and (3) traverseName.py in Plone 2.1 through 4.1, 4.2.x through 4.2.5, and 4.3.x through 4.3.1 allow remote authenticated users with administrator access to a subtree to access nodes above the subtree via unknown vectors. | 4.1rc3, 4.1, 4.1rc2, 4.1b2, 4.1b1, 4.1a2, 4.0rc1, 4.0b5 (Show all) | Patch → NO_SAFE_VERSION |
CVE-2013-4188 | traverser.py in Plone 2.1 through 4.1, 4.2.x through 4.2.5, and 4.3.x through 4.3.1 allows remote attackers with administrator privileges to cause a denial of service (infinite loop and resource consumption) via unspecified vectors related to "retrieving information for certain resources." | 4.1rc3, 4.1, 4.1rc2, 4.1b2, 4.1b1, 4.1a2, 4.0rc1, 4.0b5 (Show all) | Patch → NO_SAFE_VERSION |
CVE-2012-6661 | Zope before 2.13.19, as used in Plone before 4.2.3 and 4.3 before beta 1, does not reseed the pseudo-random number generator (PRNG), which makes it easier for remote attackers to guess the value via unspecified vectors. NOTE: this issue was SPLIT from CVE-2012-5508 due to different vulnerability types (ADT2). | 4.1rc3, 4.1, 4.1rc2, 4.1b2, 4.1b1, 4.1a2, 4.0rc1, 4.0b5 (Show all) | Patch → NO_SAFE_VERSION |
CVE-2012-5508 | The error pages in Plone before 4.2.3 and 4.3 before beta 1 allow remote attackers to obtain random numbers and derive the PRNG state for password resets via unspecified vectors. NOTE: this identifier was SPLIT per ADT2 due to different vulnerability types. CVE-2012-6661 was assigned for the PRNG reseeding issue in Zope. | 4.1rc3, 4.1, 4.1rc2, 4.1b2, 4.1b1, 4.1a2, 4.0rc1, 4.0b5 (Show all) | Patch → NO_SAFE_VERSION |
CVE-2012-5507 | AccessControl/AuthEncoding.py in Zope before 2.13.19, as used in Plone before 4.2.3 and 4.3 before beta 1, allows remote attackers to obtain passwords via vectors involving timing discrepancies in password validation. | 4.1rc3, 4.1, 4.1rc2, 4.1b2, 4.1b1, 4.1a2, 4.0rc1, 4.0b5 (Show all) | Patch → NO_SAFE_VERSION |
CVE-2012-5506 | python_scripts.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to cause a denial of service (infinite loop) via an RSS feed request for a folder the user does not have permission to access. | 4.1rc3, 4.1, 4.1rc2, 4.1b2, 4.1b1, 4.1a2, 4.0rc1, 4.0b5 (Show all) | Patch → NO_SAFE_VERSION |
CVE-2012-5505 | atat.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to read private data structures via a request for a view without a name. | 4.1rc3, 4.1, 4.1rc2, 4.1b2, 4.1b1, 4.1a2, 4.0rc1, 4.0b5 (Show all) | Patch → NO_SAFE_VERSION |
CVE-2012-5504 | Cross-site scripting (XSS) vulnerability in widget_traversal.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | 4.1rc3, 4.1, 4.1rc2, 4.1b2, 4.1b1, 4.1a2, 4.0rc1, 4.0b5 (Show all) | Patch → NO_SAFE_VERSION |
CVE-2012-5503 | ftp.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to read hidden folder contents via unspecified vectors. | 4.1rc3, 4.1, 4.1rc2, 4.1b2, 4.1b1, 4.1a2, 4.0rc1, 4.0b5 (Show all) | Patch → NO_SAFE_VERSION |
CVE-2012-5502 | Cross-site scripting (XSS) vulnerability in safe_html.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote authenticated users with permissions to edit content to inject arbitrary web script or HTML via unspecified vectors. | 4.1rc3, 4.1, 4.1rc2, 4.1b2, 4.1b1, 4.1a2, 4.0rc1, 4.0b5 (Show all) | Patch → NO_SAFE_VERSION |
CVE-2012-5501 | at_download.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to read arbitrary BLOBs (Files and Images) stored on custom content types via a crafted URL. | 4.1rc3, 4.1, 4.1rc2, 4.1b2, 4.1b1, 4.1a2, 4.0rc1, 4.0b5 (Show all) | Patch → NO_SAFE_VERSION |
CVE-2012-5500 | The batch id change script (renameObjectsByPaths.py) in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to change the titles of content items by leveraging a valid CSRF token in a crafted request. | 4.1rc3, 4.1, 4.1rc2, 4.1b2, 4.1b1, 4.1a2, 4.0rc1, 4.0b5 (Show all) | Patch → NO_SAFE_VERSION |
CVE-2012-5499 | python_scripts.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to cause a denial of service (memory consumption) via a large value, related to formatColumns. | 4.1rc3, 4.1, 4.1rc2, 4.1b2, 4.1b1, 4.1a2, 4.0rc1, 4.0b5 (Show all) | Patch → NO_SAFE_VERSION |
CVE-2012-5498 | queryCatalog.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to bypass caching and cause a denial of service via a crafted request to a collection. | 4.1rc3, 4.1, 4.1rc2, 4.1b2, 4.1b1, 4.1a2, 4.0rc1, 4.0b5 (Show all) | Patch → NO_SAFE_VERSION |
CVE-2012-5497 | membership_tool.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to enumerate user account names via a crafted URL. | 4.1rc3, 4.1, 4.1rc2, 4.1b2, 4.1b1, 4.1a2, 4.0rc1, 4.0b5 (Show all) | Patch → NO_SAFE_VERSION |
CVE-2012-5496 | kupu_spellcheck.py in Kupu in Plone before 4.0 allows remote attackers to cause a denial of service (ZServer thread lock) via a crafted URL. | 4.0rc1, 4.0b5, 4.0b3, 4.0b4, 4.0a5, 4.0b2, 4.0a4, 4.0b1 (Show all) | Patch → NO_SAFE_VERSION |
CVE-2012-5495 | python_scripts.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to execute Python code via a crafted URL, related to "go_back." | 4.1rc3, 4.1, 4.1rc2, 4.1b2, 4.1b1, 4.1a2, 4.0rc1, 4.0b5 (Show all) | Patch → NO_SAFE_VERSION |
CVE-2012-5494 | Cross-site scripting (XSS) vulnerability in python_scripts.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, related to "{u,}translate." | 4.1rc3, 4.1, 4.1rc2, 4.1b2, 4.1b1, 4.1a2, 4.0rc1, 4.0b5 (Show all) | Patch → NO_SAFE_VERSION |
CVE-2012-5493 | gtbn.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote authenticated users with certain permissions to bypass the Python sandbox and execute arbitrary Python code via unspecified vectors. | 4.1rc3, 4.1, 4.1rc2, 4.1b2, 4.1b1, 4.1a2, 4.0rc1, 4.0b5 (Show all) | Patch → NO_SAFE_VERSION |
CVE-2012-5492 | uid_catalog.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to obtain metadata about hidden objects via a crafted URL. | 4.1rc3, 4.1, 4.1rc2, 4.1b2, 4.1b1, 4.1a2, 4.0rc1, 4.0b5 (Show all) | Patch → NO_SAFE_VERSION |
CVE-2012-5491 | z3c.form, as used in Plone before 4.2.3 and 4.3 before beta 1, allows remote attackers to obtain the default form field values by leveraging knowledge of the form location and the element id. | 4.1rc3, 4.1, 4.1rc2, 4.1b2, 4.1b1, 4.1a2, 4.0rc1, 4.0b5 (Show all) | Patch → NO_SAFE_VERSION |
CVE-2012-5490 | Cross-site scripting (XSS) vulnerability in kssdevel.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | 4.1rc3, 4.1, 4.1rc2, 4.1b2, 4.1b1, 4.1a2, 4.0rc1, 4.0b5 (Show all) | Patch → NO_SAFE_VERSION |
CVE-2012-5489 | The App.Undo.UndoSupport.get_request_var_or_attr function in Zope before 2.12.21 and 3.13.x before 2.13.11, as used in Plone before 4.2.3 and 4.3 before beta 1, allows remote authenticated users to gain access to restricted attributes via unspecified vectors. | 4.1rc3, 4.1, 4.1rc2, 4.1b2, 4.1b1, 4.1a2, 4.0rc1, 4.0b5 (Show all) | Patch → NO_SAFE_VERSION |
CVE-2012-5488 | python_scripts.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to execute Python code via a crafted URL, related to createObject. | 4.1rc3, 4.1, 4.1rc2, 4.1b2, 4.1b1, 4.1a2, 4.0rc1, 4.0b5 (Show all) | Patch → NO_SAFE_VERSION |
CVE-2012-5487 | The sandbox whitelisting function (allowmodule.py) in Plone before 4.2.3 and 4.3 before beta 1 allows remote authenticated users with certain privileges to bypass the Python sandbox restriction and execute arbitrary Python code via vectors related to importing. | 4.1rc3, 4.1, 4.1rc2, 4.1b2, 4.1b1, 4.1a2, 4.0rc1, 4.0b5 (Show all) | Patch → NO_SAFE_VERSION |
CVE-2012-5486 | ZPublisher.HTTPRequest._scrubHeader in Zope 2 before 2.13.19, as used in Plone before 4.3 beta 1, allows remote attackers to inject arbitrary HTTP headers via a linefeed (LF) character. | 4.1rc3, 4.1, 4.1rc2, 4.1b2, 4.1b1, 4.1a2, 4.0rc1, 4.0b5 (Show all) | Patch → NO_SAFE_VERSION |
CVE-2012-5485 | registerConfiglet.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to execute Python code via unspecified vectors, related to the admin interface. | 4.1rc3, 4.1, 4.1rc2, 4.1b2, 4.1b1, 4.1a2, 4.0rc1, 4.0b5 (Show all) | Patch → NO_SAFE_VERSION |
CVE-2011-4462 | Plone 4.1.3 and earlier computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters. | 4.1rc3, 4.1, 4.1rc2, 4.1b2, 4.1b1, 4.1a2, 4.0rc1, 4.0b5 (Show all) | Patch → NO_SAFE_VERSION |
CVE-2011-4030 | The CMFEditions component 2.x in Plone 4.0.x through 4.0.9, 4.1, and 4.2 through 4.2a2 does not prevent the KwAsAttributes classes from being publishable, which allows remote attackers to access sub-objects via unspecified vectors, a different vulnerability than CVE-2011-3587. | 4.1rc3, 4.1, 4.1rc2, 4.1b2, 4.1b1, 4.1a2, 4.0rc1, 4.0b5 (Show all) | Patch → NO_SAFE_VERSION |
CVE-2011-2528 | Unspecified vulnerability in (1) Zope 2.12.x before 2.12.19 and 2.13.x before 2.13.8, as used in Plone 4.x and other products, and (2) PloneHotfix20110720 for Plone 3.x allows attackers to gain privileges via unspecified vectors, related to a "highly serious vulnerability." NOTE: this vulnerability exists because of an incorrect fix for CVE-2011-0720. | 4.0.1, 3.3.5, 3.3.4, 3.3.2, 4.0, 3.3.3 | Patch → NO_SAFE_VERSION |
CVE-2011-1950 | plone.app.users in Plone 4.0 and 4.1 allows remote authenticated users to modify the properties of arbitrary accounts via unspecified vectors, as exploited in the wild in June 2011. | 4.1, 4.1rc2, 4.1b2, 4.1b1, 4.1a2, 4.0rc1, 4.0b5, 4.0b3 (Show all) | Patch → NO_SAFE_VERSION |
CVE-2011-1949 | Cross-site scripting (XSS) vulnerability in the safe_html filter in Products.PortalTransforms in Plone 2.1 through 4.1 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2010-2422. | 4.1rc3, 4.1, 4.1rc2, 4.1b2, 4.1b1, 4.1a2, 4.0rc1, 4.0b5 (Show all) | Patch → NO_SAFE_VERSION |
CVE-2011-1948 | Cross-site scripting (XSS) vulnerability in Plone 4.1 and earlier allows remote attackers to inject arbitrary web script or HTML via a crafted URL. | 4.1rc3, 4.1, 4.1rc2, 4.1b2, 4.1b1, 4.1a2, 4.0rc1, 4.0b5 (Show all) | Patch → NO_SAFE_VERSION |
CVE-2011-0720 | Unspecified vulnerability in Plone 2.5 through 4.0, as used in Conga, luci, and possibly other products, allows remote attackers to obtain administrative access, read or create arbitrary content, and change the site skin via unknown vectors. | 4.0rc1, 4.0b5, 4.0b3, 4.0b4, 4.0a5, 4.0b2, 4.0a4, 4.0b1 (Show all) | Patch → NO_SAFE_VERSION |
CVE-2010-2422 | Cross-site scripting (XSS) vulnerability in PortalTransforms in Plone 2.1 through 3.3.4 before hotfix 20100612 allows remote attackers to inject arbitrary web script or HTML via the safe_html transform. | 3.3, 3.3rc5, 3.3rc1, 3.3rc2, 3.3rc4, 3.3rc3, 3.3.5, 3.3.4 (Show all) | Patch → NO_SAFE_VERSION |
Instantly see if these Plone
vulnerabilities affect your code.
Dependencies
Packages using versions of Plone affected by its vulnerabilities
Dependent Packages |
---|
setuptools>=36.2 |
plone.app.caching |
plone.app.iterate |
plone.app.upgrade |
plone.restapi |
plone.volto |
Products.CMFPlacefulWorkflow |
Products.CMFPlone |