VYPR
High severityNVD Advisory· Published Dec 30, 2020· Updated Aug 4, 2024

CVE-2020-28736

CVE-2020-28736

Description

Plone before 5.2.3 allows XXE attacks via a feature that is protected by an unapplied permission of plone.schemaeditor.ManageSchemata (therefore, only available to the Manager role).

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Plone before 5.2.3 is vulnerable to XXE attacks via the schema editor, exploitable only by Manager role due to unapplied permission.

Vulnerability

Overview

CVE-2020-28736 describes an XML External Entity (XXE) vulnerability in Plone, a content management system, affecting versions before 5.2.3. The flaw resides in a feature protected by the plone.schemaeditor.ManageSchemata permission, which is unapplied in the default configuration, meaning only users with the Manager role can access it [1][2]. The root cause is improper handling of XML input within this feature, allowing external entity injection.

Exploitation

To exploit this vulnerability, an attacker must already possess the Manager role in the Plone instance. With that privilege, they can craft malicious XML data that includes references to external entities. When processed by the vulnerable schema editor, the XML parser resolves these entities, leading to XXE [1][3]. No other authentication or network position is required beyond Manager access.

Impact

Successful exploitation can result in information disclosure, server-side request forgery (SSRF), or denial of service, depending on the capabilities of the XML parser and the server environment [2][4]. The CVSS score is not yet provided by NVD, but the GitHub Advisory notes high severity due to the potential for sensitive data exposure.

Mitigation

The vulnerability is fixed in Plone version 5.2.3 and later. Users running earlier versions should upgrade immediately. No workarounds are documented, and the feature is only accessible to Managers, which limits the attack surface but does not eliminate the risk if Manager accounts are compromised [1][4].

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
PlonePyPI
< 5.2.35.2.3
plone.app.eventPyPI
< 3.2.103.2.10
plone.app.themingPyPI
< 4.1.64.1.6
plone.app.dexterityPyPI
< 2.6.82.6.8
plone.supermodelPyPI
< 1.6.31.6.3

Affected products

6

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

6

News mentions

0

No linked articles in our index yet.