Improper Check for Unusual or Exceptional Conditions Affecting @plone/volto package, versions <16.34.1>=17.0.0 <17.22.2>=18.0.0 <18.27.2>=19.0.0-alpha.1 <19.0.0-alpha.6


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.07% (22nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Improper Check for Unusual or Exceptional Conditions vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JS-PLONEVOLTO-13173379
  • published1 Oct 2025
  • disclosed1 Oct 2025
  • creditFHNW

Introduced: 1 Oct 2025

NewCVE-2025-61668  (opens in a new tab)
CWE-476  (opens in a new tab)
CWE-754  (opens in a new tab)

How to fix?

Upgrade @plone/volto to version 16.34.1, 17.22.2, 18.27.2, 19.0.0-alpha.6 or higher.

Overview

@plone/volto is a Volto

Affected versions of this package are vulnerable to Improper Check for Unusual or Exceptional Conditions via the API REDUX middleware when a specific URL is accessed by an anonymous user. An attacker can cause the server to terminate unexpectedly by sending crafted requests to the affected endpoint.

Workaround

This vulnerability can be mitigated by configuring your environment to automatically restart processes that quit with an error, which minimizes downtime but does not prevent the crash.

CVSS Base Scores

version 4.0
version 3.1