Browse all 7 CVE security advisories affecting plone. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Plone serves as a content management system for organizations requiring secure, accessible web publishing. Historically, it has faced vulnerabilities including remote code execution, cross-site scripting, and privilege escalation, often stemming from input validation flaws and misconfigurations. While generally considered secure due to its Python-based architecture and regular security updates, Plone has had notable incidents including CVE-2021-42237, an RCE vulnerability in its REST API, and CVE-2022-24963, an XSS issue in its TinyMCE editor. The platform's security model emphasizes role-based access control and regular security audits, though its complexity can introduce potential misconfiguration risks.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2025-61668 | @plone/volto vulnerable to potential DoS by invoking specific URL by anonymous user — voltoCWE-476 | 4.3AI | MediumAI | 2025-10-02 |
| CVE-2025-58047 | Volto affected by possible DoS by invoking specific URL by anonymous user — voltoCWE-755 | 7.5 | High | 2025-08-28 |
| CVE-2022-24740 | Improper Authentication in Volto — voltoCWE-287 | 5.0 | Medium | 2022-03-14 |
This page lists every published CVE security advisory associated with plone. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.