CVE-2020-28734:
Improper Restriction of XML External Entity Reference in Plone
8.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.64346%
CWE
Published
4/7/2021
Updated
10/17/2024
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
Plone | pip | < 5.2.3 | 5.2.3 |
plone.app.event | pip | < 3.2.10 | 3.2.10 |
plone.app.theming | pip | < 4.1.6 | 4.1.6 |
plone.app.dexterity | pip | < 2.6.8 | 2.6.8 |
plone.supermodel | pip | < 1.6.3 | 1.6.3 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability centers on XML processing in privileged Manager-facing features across multiple Plone components. Analysis of affected packages (plone.supermodel
, plone.app.theming
, plone.app.event
) reveals XML parsing is a common thread. The CWE-611 pattern matches insecure XML handling without entity restrictions. Release notes specifically mention XML/ical fixes for Manager-accessible features. While exact patch diffs aren't shown, Plone's architecture and standard XXE mitigation patterns (adding resolve_entities=False
) indicate these core XML processing functions would be attack vectors. Functions were selected based on their role in processing user-controlled XML in privileged contexts.