Moderate severityNVD Advisory· Published Sep 30, 2014· Updated May 6, 2026
CVE-2012-5491
CVE-2012-5491
Description
z3c.form, as used in Plone before 4.2.3 and 4.3 before beta 1, allows remote attackers to obtain the default form field values by leveraging knowledge of the form location and the element id.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
PlonePyPI | < 4.2.3 | 4.2.3 |
PlonePyPI | >= 4.3a0, < 4.3b1 | 4.3b1 |
Affected products
72cpe:2.3:a:plone:plone:*:*:*:*:*:*:*:*+ 71 more
- cpe:2.3:a:plone:plone:*:*:*:*:*:*:*:*range: <=4.2.2
- cpe:2.3:a:plone:plone:1.0:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:1.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:1.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:1.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:1.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:1.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:1.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:2.0:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:2.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:2.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:2.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:2.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:2.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:2.1:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:2.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:2.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:2.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:2.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:2.5:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:2.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:2.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:2.5.3:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:2.5.4:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:2.5.5:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.0:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.1:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.1.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.1.6:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.1.7:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.2:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.3:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.3.4:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:3.3.5:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.0:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.0.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.1:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.1.6:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.2:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.2.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.2.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.2:a1:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.2:a2:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.2:b1:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.2:b2:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.2:rc1:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.2:rc2:*:*:*:*:*:*
- cpe:2.3:a:plone:plone:4.3:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- plone.org/products/plone-hotfix/releases/20121106nvdPatchWEB
- github.com/advisories/GHSA-f8pg-wp5j-rjxxghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2012-5491ghsaADVISORY
- plone.org/products/plone/security/advisories/20121106/07nvdVendor AdvisoryWEB
- www.openwall.com/lists/oss-security/2012/11/10/1nvdWEB
- github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txtnvdWEB
- github.com/pypa/advisory-database/tree/main/vulns/plone/PYSEC-2014-33.yamlghsaWEB
News mentions
0No linked articles in our index yet.