-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| Plone | pip | >= 4.3, < 5.2.5 | 5.2.5 |
The vulnerability stems from improper input validation in the RSS feed portlet's URL handling. Multiple sources explicitly reference 'feedparser accessing an internal URL' as the root cause. The feedparser.parse() function would be the logical point where untrusted URL input is processed without adequate restrictions on internal network targets. While exact code isn't available, Plone's architecture places RSS portlet handling in CMFPlone components, and the combination of CWE-918 classification with feedparser mentions strongly indicates this function as the vulnerable entry point.
KEV Misses 88% of Exploited CVEs- Get the report