CVE-2020-7936: Plone Open Redirect Vulnerability
6.1
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.56092%
CWE
Published
5/24/2022
Updated
10/18/2024
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
Plone | pip | >= 4.0, < 4.3.20 | 4.3.20 |
Plone | pip | >= 5.0rc1, < 5.1.7 | 5.1.7 |
Plone | pip | >= 5.2.0, < 5.2.2 | 5.2.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from improper validation
of redirect URLs. Multiple sources (Plone security hotfix notes, CVE description, and mailing list discussion) explicitly reference the isURLInPortal
check being bypassed. This function is responsible for ensuring URLs belong to the portal domain before allowing redirects. The hotfix addressed this by strengthening its validation
logic, confirming its role in the vulnerability. While no direct code diffs are available, the consistent references to this function across all vulnerability descriptions provide high-confidence attribution.