![]() |
|
Message-ID: <b1209946-938c-4b87-8fae-df9212a064d3@plone.org> Date: Thu, 28 Aug 2025 17:11:02 +0200 From: "Maurits van Rees (Plone)" <maurits@...ne.org> To: oss-security@...ts.openwall.com Subject: CVE-2025-58047: DoS in Volto (Plone CMS) A vulnerability has been discovered in Volto, the default NodeJS frontend for the Plone CMS. ### Impact When visiting a specific URL, an anonymous user could cause the NodeJS server part of Volto to quit with an error. ### Patches The problem has been patched and the patch has been backported to Volto major versions down until 16. It is advised to upgrade to the latest patch release of your respective current major version: * Volto 16: [16.34.0](https://github.com/plone/volto/releases/tag/16.34.0) * Volto 17: [17.22.1](https://github.com/plone/volto/releases/tag/17.22.1) * Volto 18: [18.24.0](https://github.com/plone/volto/releases/tag/18.24.0) * Volto 19: [19.0.0-alpha4](https://github.com/plone/volto/releases/tag/19.0.0-alpha.4) ### Workarounds Make sure your setup automatically restarts processes that quit with an error. This won't prevent a crash, but it minimises downtime. ### Report The problem was discovered by FHNW, a client of Plone provider kitconcept, who shared it with the Plone Zope Security Team (security@...ne.org). ### Github Advisory The same information was published to GitHub in this [advisory](https://github.com/plone/volto/security/advisories/GHSA-xjhf-7833-3pm5). Maurits van Rees Plone/Zope Security Team
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.