{"id":"CVE-2021-33926","details":"An issue in Plone CMS v. 5.2.4, 5.2.3, 5.2.2, 5.2.1, 5.2.0, 5.1rc2, 5.1rc1, 5.1b4, 5.1b3, 5.1b2, 5.1a2, 5.1a1, 5.1.7, 5.1.6, 5.1.5, 5.1.4, 5.1.2, 5.1.1 5.1, 5.0rc3, 5.0rc2, 5.0rc1, 5.0.9, 5.0.8, 5.0.7, 5.0.6, 5.0.5, 5.0.4, 5.0.3, 5.0.2, 5.0.10, 5.0.1, 5.0, 4.3.9, 4.3.8, 4.3.7, 4.3.6, 4.3.5, 4.3.4, 4.3.3, 4.3.20, 4 allows attacker to access sensitive information via the RSS feed protlet.","aliases":["GHSA-47p5-p3jw-w78w","PYSEC-2023-289"],"modified":"2026-04-10T04:34:19.830642Z","published":"2023-02-17T18:15:11.237Z","references":[{"type":"ADVISORY","url":"https://plone.org/security/hotfix/20210518"},{"type":"ADVISORY","url":"https://plone.org/security/hotfix/20210518/blind-ssrf-via-feedparser-accessing-an-internal-url"},{"type":"EVIDENCE","url":"https://github.com/s-kustm/Subodh/blob/master/Plone%205.2.4%20Vulnerable%20to%20bilend%20SSRF.pdf"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/plone/plone","events":[{"introduced":"0"},{"last_affected":"3e0c78057de5798ed989d0b2ed9dd12ec39978e1"},{"introduced":"0"},{"last_affected":"8a6687397896c935b7f2c59b58500fdf234854bb"},{"introduced":"0"},{"last_affected":"b0a5c6ce2148edc9c2055961f64af788d1054fc4"},{"introduced":"0"},{"last_affected":"00a67de4ddd27cdec07ed6f4c834131b492e3f91"},{"introduced":"0"},{"last_affected":"16257e3b0027d6f811aceff565aca0879d85be7d"},{"introduced":"0"},{"last_affected":"cdf44d1d0bea8b8d48f896ad7821d37715142ccf"},{"introduced":"0"},{"last_affected":"ab50347a0aeb2c3d68b6f7faae6a82d0a0e91516"},{"introduced":"0"},{"last_affected":"c7ca35de26093e40ae01ad0778b960cfde71fb3d"},{"introduced":"0"},{"last_affected":"83b346aef1cd7a5ea851fe5c02af4b94648767c6"},{"introduced":"0"},{"last_affected":"829aa2dd9d8f088ebf8f3da49b9e32ba90326135"},{"introduced":"0"},{"last_affected":"217e9c10670623e7a06a7bdeca2f80dae73c77d0"},{"introduced":"0"},{"last_affected":"6ffff6a69083367d6d6720444aa067be4899780b"},{"introduced":"0"},{"last_affected":"25b2df09645b35a1fb0d1ebc570e0db335f180ed"},{"introduced":"0"},{"last_affected":"0fa486eba1ec6241c75fcc3cbf4e897148d3b466"},{"introduced":"0"},{"last_affected":"9a4b79c0e955f7868a081838913b9f0f77407616"},{"introduced":"0"},{"last_affected":"2b9514e1d06d7669e18c3eee19e0a728cbfc8f2b"},{"introduced":"0"},{"last_affected":"ab6705463eda594906a647360bcddf36647fce93"},{"introduced":"0"},{"last_affected":"6022f9e921e21366c1c7ddfc80b3165e5fd94dd4"},{"introduced":"0"},{"last_affected":"3e89ee5f870a3d25b49e7e6ebdb27990875cae63"},{"introduced":"0"},{"last_affected":"c4244a4887e0901a1c17b3ee60e1cfbe19ee46c5"},{"introduced":"0"},{"last_affected":"5f05c642ef0796b15e447793755b1bbd8ce40905"},{"introduced":"0"},{"last_affected":"c3d7603485d808537e024883ce401ad504924a5a"},{"introduced":"0"},{"last_affected":"eb76237a4e6587a8249acfe0649c153d9d1df910"},{"introduced":"0"},{"last_affected":"006f2dc3068b6d935e30bbea8e4ba41f6acacf33"},{"introduced":"0"},{"last_affected":"5d3edca6781cf97ae971db366f847e01887995e2"},{"introduced":"0"},{"last_affected":"6371a276e3775cb11070862a0045b34aa1973b12"},{"introduced":"0"},{"last_affected":"d4d2a336b6ec125c60610a22a003502858ac51a5"},{"introduced":"0"},{"last_affected":"5fe576e77155d3a1946699472dc064c66e8facb5"},{"introduced":"0"},{"last_affected":"42964e94bc07a40a76496e9746fa10b57c21a2d7"},{"introduced":"0"},{"last_affected":"e796b02b33f08b484148f46500acacce57d23824"},{"introduced":"0"},{"last_affected":"d6a6dbfe97aad49859a8eab80320110fd5942272"},{"introduced":"0"},{"last_affected":"f5e1e8ceeb41d8aef7d29073c02cfa212210483a"},{"introduced":"0"},{"last_affected":"8ac8818f7be3d2499fec4ccc5d523f9a3c7f2835"},{"introduced":"0"},{"last_affected":"4d260f76643a633d312b81d568ca5bed57e330e0"},{"introduced":"0"},{"last_affected":"a27e67b0ef35cbea696e760a4fd34421a06e52d6"},{"introduced":"0"},{"last_affected":"4c03e456f366bebbcb53723e89f82f205a8df608"},{"introduced":"0"},{"last_affected":"c25b9bef52de7a5bd22e1b74a48682ee72d0e80c"},{"introduced":"0"},{"last_affected":"b30af5105c967382c5f069ba6114a1b2a478b8f8"},{"introduced":"0"},{"last_affected":"67fe0ff62e07418aa5f67cf74d013c60ff8f27b9"},{"introduced":"0"},{"last_affected":"e269e38730b86c1a890bb027a6eb59f2e79e3531"},{"introduced":"0"},{"last_affected":"134fa3b3d9c0f02e30beb86c6259436d0fdfc33b"},{"introduced":"0"},{"last_affected":"0bbf455c2dbae410102dc34522bbba97e6003bd7"},{"introduced":"0"},{"last_affected":"8f1c58eba3de77e90537f8f3f68b0b54996e3cca"},{"introduced":"0"},{"last_affected":"f60eabc07798a9d4418d8752a528d5dc2983c8d3"},{"introduced":"0"},{"last_affected":"d5b50de9c17faac5051d06141bd12cd3e40af8e8"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"4.3"},{"introduced":"0"},{"last_affected":"4.3.1"},{"introduced":"0"},{"last_affected":"4.3.2"},{"introduced":"0"},{"last_affected":"4.3.3"},{"introduced":"0"},{"last_affected":"4.3.4"},{"introduced":"0"},{"last_affected":"4.3.5"},{"introduced":"0"},{"last_affected":"4.3.6"},{"introduced":"0"},{"last_affected":"4.3.7"},{"introduced":"0"},{"last_affected":"4.3.8"},{"introduced":"0"},{"last_affected":"4.3.9"},{"introduced":"0"},{"last_affected":"4.3.10"},{"introduced":"0"},{"last_affected":"4.3.11"},{"introduced":"0"},{"last_affected":"4.3.12"},{"introduced":"0"},{"last_affected":"4.3.14"},{"introduced":"0"},{"last_affected":"4.3.15"},{"introduced":"0"},{"last_affected":"4.3.17"},{"introduced":"0"},{"last_affected":"4.3.18"},{"introduced":"0"},{"last_affected":"4.3.19"},{"introduced":"0"},{"last_affected":"4.3.20"},{"introduced":"0"},{"last_affected":"5.0-NA"},{"introduced":"0"},{"last_affected":"5.0-rc1"},{"introduced":"0"},{"last_affected":"5.0-rc2"},{"introduced":"0"},{"last_affected":"5.0-rc3"},{"introduced":"0"},{"last_affected":"5.0.1"},{"introduced":"0"},{"last_affected":"5.0.2"},{"introduced":"0"},{"last_affected":"5.0.3"},{"introduced":"0"},{"last_affected":"5.0.4"},{"introduced":"0"},{"last_affected":"5.0.5"},{"introduced":"0"},{"last_affected":"5.0.6"},{"introduced":"0"},{"last_affected":"5.0.7"},{"introduced":"0"},{"last_affected":"5.0.8"},{"introduced":"0"},{"last_affected":"5.0.9"},{"introduced":"0"},{"last_affected":"5.0.10"},{"introduced":"0"},{"last_affected":"5.1.1"},{"introduced":"0"},{"last_affected":"5.1.2"},{"introduced":"0"},{"last_affected":"5.1.4"},{"introduced":"0"},{"last_affected":"5.1.5"},{"introduced":"0"},{"last_affected":"5.1.6"},{"introduced":"0"},{"last_affected":"5.1.7"},{"introduced":"0"},{"last_affected":"5.1rc2-NA"},{"introduced":"0"},{"last_affected":"5.2.0"},{"introduced":"0"},{"last_affected":"5.2.1"},{"introduced":"0"},{"last_affected":"5.2.2"},{"introduced":"0"},{"last_affected":"5.2.3"},{"introduced":"0"},{"last_affected":"5.2.4"}]}}],"versions":["4.1.0","4.1a1","4.1a2","4.1a3","4.1b1","4.1b2","4.1rc1","4.1rc2","4.1rc3","4.2a1","4.2a2","4.2b1","4.2b2","4.3","4.3.1","4.3.10","4.3.11","4.3.12","4.3.13","4.3.14","4.3.15","4.3.16","4.3.17","4.3.18","4.3.19","4.3.2","4.3.20","4.3.3","4.3.4","4.3.5","4.3.6","4.3.7","4.3.8","4.3.9","4.3a1","4.3a2","4.3b1","4.3b2","5.0","5.0.1","5.0.10","5.0.2","5.0.4","5.0.5","5.0.6","5.0.7","5.0.8","5.0.9","5.0a2","5.0a3","5.0b1","5.0b2","5.0b3","5.0b4","5.0rc1","5.0rc2","5.0rc3","5.1.0","5.1.1","5.1.2","5.1.3","5.1.4","5.1.5","5.1.6","5.1.7","5.1a1","5.1a2","5.1b1","5.1b2","5.1b3","5.1b4","5.1rc1","5.1rc2","5.2.0","5.2.1","5.2.2","5.2.3","5.2.4","5.2a1","5.2a2","5.2b1","5.2rc1","5.2rc2","5.2rc3","5.2rc4","5.2rc5"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"5.1-alpha2"}]},{"events":[{"introduced":"0"},{"last_affected":"5.1a1-alpha1"}]},{"events":[{"introduced":"0"},{"last_affected":"5.1a2-beta4"}]},{"events":[{"introduced":"0"},{"last_affected":"5.1b2-beta3"}]},{"events":[{"introduced":"0"},{"last_affected":"5.1b3-beta2"}]},{"events":[{"introduced":"0"},{"last_affected":"5.1b4-rc2"}]},{"events":[{"introduced":"0"},{"last_affected":"5.1rc1-rc1"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-33926.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}