
26/6/2013

11/3/2014

17/5/2022

14/10/2024
CVE-2013-4189
First published: Wed Jun 26 2013(Updated: )
A privilege escalation flaw was found in the way Plone, a user friendly and powerful content management system, enforced authorization for users having administrator privilege access for a subtree of a particular node (access to node above that subtree was granted even when the user in question has had administrator privilege only for a subtree of that node). A remote attacker, with administrator user privilege to certain subtree of Plone actions / functionality, could use this flaw to access / alter also higher nodes.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|
pip/Plone | >=4.3<4.3.2 | 4.3.2 |
pip/Plone | >=4.2<4.2.6 | 4.2.6 |
pip/Plone | >=2.1<=4.1 | |
Plone CMS | =2.1 | |
Plone CMS | =2.1.1 | |
Plone CMS | =2.1.2 | |
Plone CMS | =2.1.3 | |
Plone CMS | =2.1.4 | |
Plone CMS | =2.5 | |
Plone CMS | =2.5.1 | |
Plone CMS | =2.5.2 | |
Plone CMS | =2.5.3 | |
Plone CMS | =2.5.4 | |
Plone CMS | =2.5.5 | |
Plone CMS | =3.0 | |
Plone CMS | =3.0.1 | |
Plone CMS | =3.0.2 | |
Plone CMS | =3.0.3 | |
Plone CMS | =3.0.4 | |
Plone CMS | =3.0.5 | |
Plone CMS | =3.0.6 | |
Plone CMS | =3.1 | |
Plone CMS | =3.1.1 | |
Plone CMS | =3.1.2 | |
Plone CMS | =3.1.3 | |
Plone CMS | =3.1.4 | |
Plone CMS | =3.1.5.1 | |
Plone CMS | =3.1.6 | |
Plone CMS | =3.1.7 | |
Plone CMS | =3.2 | |
Plone CMS | =3.2.1 | |
Plone CMS | =3.2.2 | |
Plone CMS | =3.2.3 | |
Plone CMS | =3.3 | |
Plone CMS | =3.3.1 | |
Plone CMS | =3.3.2 | |
Plone CMS | =3.3.3 | |
Plone CMS | =3.3.4 | |
Plone CMS | =3.3.5 | |
Plone CMS | =4.0 | |
Plone CMS | =4.0.1 | |
Plone CMS | =4.0.2 | |
Plone CMS | =4.0.3 | |
Plone CMS | =4.0.4 | |
Plone CMS | =4.0.5 | |
Plone CMS | =4.0.6.1 | |
Plone CMS | =4.1 | |
Plone CMS | =4.2 | |
Plone CMS | =4.2.1 | |
Plone CMS | =4.2.2 | |
Plone CMS | =4.2.3 | |
Plone CMS | =4.2.4 | |
Plone CMS | =4.2.5 | |
Plone CMS | =4.3 | |
Plone CMS | =4.3.1 | |
Never miss a vulnerability like this again
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
Frequently Asked Questions
What is the severity of CVE-2013-4189?
CVE-2013-4189 is rated as a medium severity vulnerability due to its potential for privilege escalation.
How do I fix CVE-2013-4189?
To fix CVE-2013-4189, upgrade Plone to version 4.3.2 or 4.2.6.
What software versions are affected by CVE-2013-4189?
CVE-2013-4189 affects Plone versions 2.1 through 4.3.1.
What kind of vulnerability is CVE-2013-4189?
CVE-2013-4189 is a privilege escalation vulnerability allowing unauthorized access to certain user privileges.
Is there a patch available for CVE-2013-4189?
Yes, patches are available through Plone version updates.
- agent/first-publish-date
- agent/type
- agent/remedy
- agent/softwarecombine
- agent/description
- collector/redhat-bugzilla
- source/Red Hat
- alias/CVE-2013-4189
- agent/author
- collector/mitre-cve
- source/MITRE
- agent/event
- collector/github-advisory-latest
- source/GitHub
- alias/GHSA-pwpq-632g-h49g
- agent/software-canonical-lookup
- agent/last-modified-date
- agent/severity
- agent/references
- collector/github-advisory
- agent/trending
- agent/source
- agent/tags
- collector/nvd-cve
- source/NVD
- agent/software-canonical-lookup-request
- collector/nvd-index
- package-manager/pip
- vendor/plone
- canonical/plone cms
- version/plone cms/2.1
- version/plone cms/2.1.1
- version/plone cms/2.1.2
- version/plone cms/2.1.3
- version/plone cms/2.1.4
- version/plone cms/2.5
- version/plone cms/2.5.1
- version/plone cms/2.5.2
- version/plone cms/2.5.3
- version/plone cms/2.5.4
- version/plone cms/2.5.5
- version/plone cms/3.0
- version/plone cms/3.0.1
- version/plone cms/3.0.2
- version/plone cms/3.0.3
- version/plone cms/3.0.4
- version/plone cms/3.0.5
- version/plone cms/3.0.6
- version/plone cms/3.1
- version/plone cms/3.1.1
- version/plone cms/3.1.2
- version/plone cms/3.1.3
- version/plone cms/3.1.4
- version/plone cms/3.1.5.1
- version/plone cms/3.1.6
- version/plone cms/3.1.7
- version/plone cms/3.2
- version/plone cms/3.2.1
- version/plone cms/3.2.2
- version/plone cms/3.2.3
- version/plone cms/3.3
- version/plone cms/3.3.1
- version/plone cms/3.3.2
- version/plone cms/3.3.3
- version/plone cms/3.3.4
- version/plone cms/3.3.5
- version/plone cms/4.0
- version/plone cms/4.0.1
- version/plone cms/4.0.2
- version/plone cms/4.0.3
- version/plone cms/4.0.4
- version/plone cms/4.0.5
- version/plone cms/4.0.6.1
- version/plone cms/4.1
- version/plone cms/4.2
- version/plone cms/4.2.1
- version/plone cms/4.2.2
- version/plone cms/4.2.3
- version/plone cms/4.2.4
- version/plone cms/4.2.5
- version/plone cms/4.3
- version/plone cms/4.3.1
Contact
SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.coBy using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203