Safety vulnerability ID: 40528
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Plone CMS until version 5.2.4 has a stored Cross-Site Scripting (XSS) vulnerability in the user fullname property and the file upload functionality. The user's input data is not properly encoded when being echoed back to the user. This data can be interpreted as executable code by the browser and allows an attacker to execute JavaScript in the context of the victim's browser if the victim opens a vulnerable page containing an XSS payload.
Latest version: 6.1.1
The Plone Content Management System
Plone CMS until version 5.2.4 has a stored Cross-Site Scripting (XSS) vulnerability in the user fullname property and the file upload functionality. The user's input data is not properly encoded when being echoed back to the user. This data can be interpreted as executable code by the browser and allows an attacker to execute JavaScript in the context of the victim's browser if the victim opens a vulnerable page containing an XSS payload. See CVE-2021-3313.
MISC:https://plone.org/download/releases/5.2.3: https://plone.org/download/releases/5.2.3
MISC:https://plone.org/security/hotfix/20210518: https://plone.org/security/hotfix/20210518
MISC:https://www.compass-security.com/fileadmin/Research/Advisories/2021-07_CSNC-2021-013_XSS_in_Plone_CMS.txt: https://www.compass-security.com/fileadmin/Research/Advisories/2021-07_CSNC-2021-013_XSS_in_Plone_CMS.txt
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application