-
CVSS Score
-A Semantic Attack on Google Gemini - Read the Latest Research
The vulnerability stems from missing password strength checks in specific forms. Plone's password validation logic typically resides in Products.PlonePAS.utils, and registration/password reset forms are common points of entry. The 'validate_credentials' function is central to password checks, and its incomplete implementation in affected versions would explain the weakness. RegistrationTool's form handling is another logical candidate, as user creation flows would bypass validation. While exact patch details are unavailable, these components align with the described vulnerability nature and Plone's architecture.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| Plone | pip | >= 4.3, < 4.3.20 | 4.3.20 |
| Plone | pip | >= 5.0rc1, < 5.1.7 | 5.1.7 |
| Plone | pip | >= 5.2.0, < 5.2.2 | 5.2.2 |