Description
An issue in Plone CMS v. 5.2.4, 5.2.3, 5.2.2, 5.2.1, 5.2.0, 5.1rc2, 5.1rc1, 5.1b4, 5.1b3, 5.1b2, 5.1a2, 5.1a1, 5.1.7, 5.1.6, 5.1.5, 5.1.4, 5.1.2, 5.1.1 5.1, 5.0rc3, 5.0rc2, 5.0rc1, 5.0.9, 5.0.8, 5.0.7, 5.0.6, 5.0.5, 5.0.4, 5.0.3, 5.0.2, 5.0.10, 5.0.1, 5.0, 4.3.9, 4.3.8, 4.3.7, 4.3.6, 4.3.5, 4.3.4, 4.3.3, 4.3.20, 4 allows attacker to access sensitive information via the RSS feed protlet.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-0204 | Server-Side Request Forgery in Plone CMS |
Github GHSA |
GHSA-47p5-p3jw-w78w | Server-Side Request Forgery in Plone CMS |
References
History
Wed, 19 Mar 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-03-19T14:13:01.636Z
Reserved: 2021-06-07T00:00:00.000Z
Link: CVE-2021-33926
Updated: 2024-08-04T00:05:51.742Z
Status : Modified
Published: 2023-02-17T18:15:11.237
Modified: 2025-03-19T15:15:36.160
Link: CVE-2021-33926
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA