High severityNVD Advisory· Published Mar 20, 2008· Updated Apr 23, 2026
CVE-2008-1393
CVE-2008-1393
Description
Plone CMS 3.0.5, and probably other 3.x versions, places a base64 encoded form of the username and password in the __ac cookie for the admin account, which makes it easier for remote attackers to obtain administrative privileges by sniffing the network.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
PlonePyPI | < 3.0 | 3.0 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
8- plone.org/documentation/how-to/secure-login-without-plain-text-passwordsnvdExploitWEB
- plone.org/products/plone/roadmap/48nvdExploitWEB
- github.com/advisories/GHSA-593c-j348-f3gvghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2008-1393ghsaADVISORY
- securityreason.com/securityalert/3754nvdWEB
- www.procheckup.com/Hacking_Plone_CMS.pdfnvdWEB
- www.securityfocus.com/archive/1/489544/100/0/threadednvdWEB
- exchange.xforce.ibmcloud.com/vulnerabilities/41427nvdWEB
News mentions
0No linked articles in our index yet.