VYPR
Critical severityNVD Advisory· Published May 21, 2021· Updated Aug 3, 2024

CVE-2021-33509

CVE-2021-33509

Description

Plone through 5.2.4 allows remote authenticated managers to perform disk I/O via crafted keyword arguments to the ReStructuredText transform in a Python script.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Plone CMS versions up to 5.2.4 allow remote authenticated managers to perform arbitrary file read/write through crafted keyword arguments to the ReStructuredText transform in a Python script.

Vulnerability

The vulnerability exists in Plone CMS through version 5.2.4 (and all earlier 5.x versions, as well as 4.3.20 and earlier 4.3.x versions) [3]. It allows remote authenticated managers to craft keyword arguments in a Python script that uses the ReStructuredText transform, leading to disk I/O operations such as arbitrary file read or write [1][4]. The affected component is the ReStructuredText transform, which can be invoked with malicious parameters.

Exploitation

An attacker must have a valid manager account in a Plone site. No additional privileges are required beyond manager-level authentication [1]. The attacker crafts a Python script that calls the ReStructuredText transform with specially crafted keyword arguments that include file paths or content. The script can be executed via the web interface. The attacker does not need any special network position besides being able to access the Plone instance as a manager.

Impact

Successful exploitation allows an authenticated manager to read or write arbitrary files on the server filesystem [1][4]. This can lead to disclosure of sensitive information (e.g., configuration files, passwords) or modification of critical system files, potentially leading to full compromise of the Plone server. The impact is high as it allows disk I/O beyond normal web application boundaries.

Mitigation

Plone released a security hotfix on May 18, 2021, which addresses this vulnerability [3]. Administrators should apply the hotfix immediately on all affected versions (Plone 4.3.20 and earlier, Plone 5.2.4 and earlier). There is no workaround if the hotfix cannot be applied; upgrading to a patched version is the recommended mitigation. As of the advisory, no CVE assignment was available at the time of hotfix release, but CVE-2021-33509 was later assigned [4]. The hotfix is available from the Plone security page [1][3].

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
PlonePyPI
< 5.2.55.2.5

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.