-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| plone | pip | < 4.0 | 4.0 |
The vulnerability description explicitly identifies kupu_spellcheck.py as the source. The CWE-400 (resource consumption) aligns with the ZServer thread lock mechanism described. While the exact function name isn't specified in available sources, the file's URL handling logic for spellcheck requests would be the entry point for the crafted URL attack. Multiple authoritative sources (CVE, GHSA, Plone advisories) consistently point to this file as the vulnerable component. The lack of input validation/rate limiting in the spellcheck URL handler would allow DoS via thread exhaustion.
KEV Misses 88% of Exploited CVEs- Get the report