CVE-2021-33509
Description
Plone through 5.2.4 allows remote authenticated managers to perform disk I/O via crafted keyword arguments to the ReStructuredText transform in a Python script.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Plone CMS versions up to 5.2.4 allow remote authenticated managers to perform arbitrary file read/write through crafted keyword arguments to the ReStructuredText transform in a Python script.
Vulnerability
The vulnerability exists in Plone CMS through version 5.2.4 (and all earlier 5.x versions, as well as 4.3.20 and earlier 4.3.x versions) [3]. It allows remote authenticated managers to craft keyword arguments in a Python script that uses the ReStructuredText transform, leading to disk I/O operations such as arbitrary file read or write [1][4]. The affected component is the ReStructuredText transform, which can be invoked with malicious parameters.
Exploitation
An attacker must have a valid manager account in a Plone site. No additional privileges are required beyond manager-level authentication [1]. The attacker crafts a Python script that calls the ReStructuredText transform with specially crafted keyword arguments that include file paths or content. The script can be executed via the web interface. The attacker does not need any special network position besides being able to access the Plone instance as a manager.
Impact
Successful exploitation allows an authenticated manager to read or write arbitrary files on the server filesystem [1][4]. This can lead to disclosure of sensitive information (e.g., configuration files, passwords) or modification of critical system files, potentially leading to full compromise of the Plone server. The impact is high as it allows disk I/O beyond normal web application boundaries.
Mitigation
Plone released a security hotfix on May 18, 2021, which addresses this vulnerability [3]. Administrators should apply the hotfix immediately on all affected versions (Plone 4.3.20 and earlier, Plone 5.2.4 and earlier). There is no workaround if the hotfix cannot be applied; upgrading to a patched version is the recommended mitigation. As of the advisory, no CVE assignment was available at the time of hotfix release, but CVE-2021-33509 was later assigned [4]. The hotfix is available from the Plone security page [1][3].
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
PlonePyPI | < 5.2.5 | 5.2.5 |
Affected products
2- Plone/Plonedescription
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/advisories/GHSA-hm2p-fhwx-9285ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2021-33509ghsaADVISORY
- www.openwall.com/lists/oss-security/2021/05/22/1ghsamailing-listx_refsource_MLISTWEB
- github.com/pypa/advisory-database/tree/main/vulns/plone/PYSEC-2021-81.yamlghsaWEB
- plone.org/security/hotfix/20210518/writing-arbitrary-files-via-docutils-and-python-scriptghsax_refsource_MISCWEB
News mentions
0No linked articles in our index yet.