Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <b1209946-938c-4b87-8fae-df9212a064d3@plone.org>
Date: Thu, 28 Aug 2025 17:11:02 +0200
From: "Maurits van Rees (Plone)" <maurits@...ne.org>
To: oss-security@...ts.openwall.com
Subject: CVE-2025-58047: DoS in Volto (Plone CMS)

A vulnerability has been discovered in Volto, the default NodeJS 
frontend for the Plone CMS.

### Impact

When visiting a specific URL, an anonymous user could cause the NodeJS 
server part of Volto to quit with an error.

### Patches

The problem has been patched and the patch has been backported to Volto 
major versions down until 16. It is advised to upgrade to the latest 
patch release of your respective current major version:

* Volto 16: [16.34.0](https://github.com/plone/volto/releases/tag/16.34.0)
* Volto 17: [17.22.1](https://github.com/plone/volto/releases/tag/17.22.1)
* Volto 18: [18.24.0](https://github.com/plone/volto/releases/tag/18.24.0)
* Volto 19: 
[19.0.0-alpha4](https://github.com/plone/volto/releases/tag/19.0.0-alpha.4)

### Workarounds

Make sure your setup automatically restarts processes that quit with an 
error. This won't prevent a crash, but it minimises downtime.

### Report

The problem was discovered by FHNW, a client of Plone provider 
kitconcept, who shared it with the Plone Zope Security Team 
(security@...ne.org).

### Github Advisory

The same information was published to GitHub in this 
[advisory](https://github.com/plone/volto/security/advisories/GHSA-xjhf-7833-3pm5).

Maurits van Rees
Plone/Zope Security Team



Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.