18.28.2
7 years ago
7 days ago
Known vulnerabilities in the @plone/volto package. This does not include vulnerabilities belonging to this package’s dependencies.
Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.
Fix for freeVulnerability | Vulnerable Version |
---|---|
@plone/volto is a Volto Affected versions of this package are vulnerable to Improper Check for Unusual or Exceptional Conditions via the API REDUX middleware when a specific URL is accessed by an anonymous user. An attacker can cause the server to terminate unexpectedly by sending crafted requests to the affected endpoint. How to fix Improper Check for Unusual or Exceptional Conditions? Upgrade | <16.34.1>=17.0.0 <17.22.2>=18.0.0 <18.27.2>=19.0.0-alpha.1 <19.0.0-alpha.6 |
@plone/volto is a Volto Affected versions of this package are vulnerable to Improper Handling of Exceptional Conditions via accessing a specific URL as an anonymous user. An attacker can cause the server process to terminate unexpectedly by sending crafted requests to the affected endpoint. How to fix Improper Handling of Exceptional Conditions? Upgrade | <16.34.0>=17.0.0 <17.22.1>=18.0.0 <18.24.0>=19.0.0-alpha.1 <19.0.0-alpha.4 |
@plone/volto is a Volto Affected versions of this package are vulnerable to Access Restriction Bypass by allowing a user to change his authentication cookie with another user's cookie, giving them control of the other user's account and privileges. This occurs when using an outdated version of the How to fix Access Restriction Bypass? Upgrade | <15.0.0-alpha.0 |