Miggo Logo

CVE-2021-29002: Plone XSS Vulnerability

5.4

CVSS Score
3.1

Basic Information

EPSS Score
0.53625%
Published
5/24/2022
Updated
11/22/2024
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
plonepip<= 5.2.3

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability explicitly references the 'form.widgets.site_title' parameter in the site-controlpanel. The SiteControlPanel form handler (in Products/CMFPlone) is responsible for processing and storing this input. Since the exploit demonstrates that raw HTML/script tags in the site title are rendered without neutralization, the update method (or equivalent form processing logic) likely fails to sanitize the input before persistence or rendering. This matches the XSS pattern where user-controlled data is reflected unsafely in output templates.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

* stor** *ross-sit* s*riptin* (XSS) vuln*r**ility in Plon* *MS *.*.* *xists in sit*-*ontrolp*n*l vi* t** `*orm.wi***ts.sit*_titl*` p*r*m*t*r.

Reasoning

T** vuln*r**ility *xpli*itly r***r*n**s t** '*orm.wi***ts.sit*_titl*' p*r*m*t*r in t** sit*-*ontrolp*n*l. T** `Sit**ontrolP*n*l` *orm **n*l*r (in `Pro*u*ts/*M*Plon*`) is r*sponsi*l* *or pro**ssin* *n* storin* t*is input. Sin** t** *xploit **monstr*t*