CVE-2021-33926

An issue in Plone CMS v. 5.2.4, 5.2.3, 5.2.2, 5.2.1, 5.2.0, 5.1rc2, 5.1rc1, 5.1b4, 5.1b3, 5.1b2, 5.1a2, 5.1a1, 5.1.7, 5.1.6, 5.1.5, 5.1.4, 5.1.2, 5.1.1 5.1, 5.0rc3, 5.0rc2, 5.0rc1, 5.0.9, 5.0.8, 5.0.7, 5.0.6, 5.0.5, 5.0.4, 5.0.3, 5.0.2, 5.0.10, 5.0.1, 5.0, 4.3.9, 4.3.8, 4.3.7, 4.3.6, 4.3.5, 4.3.4, 4.3.3, 4.3.20, 4 allows attacker to access sensitive information via the RSS feed protlet.
SSRF
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
8.8 HIGH
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
mitreCNA
---
---
CVEADP
---
---
CISA-ADPADP
8.8 HIGH
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 43%
VendorProductVersion
ploneplone
4.3
ploneplone
4.3.1
ploneplone
4.3.2
ploneplone
4.3.3
ploneplone
4.3.4
ploneplone
4.3.5
ploneplone
4.3.6
ploneplone
4.3.7
ploneplone
4.3.8
ploneplone
4.3.9
ploneplone
4.3.10
ploneplone
4.3.11
ploneplone
4.3.12
ploneplone
4.3.14
ploneplone
4.3.15
ploneplone
4.3.17
ploneplone
4.3.18
ploneplone
4.3.19
ploneplone
4.3.20
ploneplone
5.0
ploneplone
5.0:rc1
ploneplone
5.0:rc2
ploneplone
5.0:rc3
ploneplone
5.0.1
ploneplone
5.0.2
ploneplone
5.0.3
ploneplone
5.0.4
ploneplone
5.0.5
ploneplone
5.0.6
ploneplone
5.0.7
ploneplone
5.0.8
ploneplone
5.0.9
ploneplone
5.0.10
ploneplone
5.1:alpha2
ploneplone
5.1.1
ploneplone
5.1.2
ploneplone
5.1.4
ploneplone
5.1.5
ploneplone
5.1.6
ploneplone
5.1.7
ploneplone
5.1a1:a1
ploneplone
5.1a2:a2
ploneplone
5.1b2:b2
ploneplone
5.1b3:b3
ploneplone
5.1b4:b4
ploneplone
5.1rc1:rc1
ploneplone
5.1rc2:rc2
ploneplone
5.2.0
ploneplone
5.2.1
ploneplone
5.2.2
ploneplone
5.2.3
ploneplone
5.2.4
𝑥
= Vulnerable software versions