CVE-2021-32811

Remote Code Execution via Script (Python) objects under Python 3

Description

Zope is an open-source web application server. Zope versions prior to versions 4.6.3 and 5.3 have a remote code execution security issue. In order to be affected, one must use Python 3 for one's Zope deployment, run Zope 4 below version 4.6.3 or Zope 5 below version 5.3, and have the optional `Products.PythonScripts` add-on package installed. By default, one must have the admin-level Zope "Manager" role to add or edit Script (Python) objects through the web. Only sites that allow untrusted users to add/edit these scripts through the web are at risk. Zope releases 4.6.3 and 5.3 are not vulnerable. As a workaround, a site administrator can restrict adding/editing Script (Python) objects through the web using the standard Zope user/role permission mechanisms. Untrusted users should not be assigned the Zope Manager role and adding/editing these scripts through the web should be restricted to trusted users only. This is the default configuration in Zope.

Categories

7.5
CVSS
Severity: High
CVSS 3.1 •
CVSS 2.0 •
EPSS 3.93% Top 15%
Third-Party Advisory github.com Third-Party Advisory github.com Third-Party Advisory github.com
Affected: zopefoundation Zope
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2021-32811?
CVE-2021-32811 has been scored as a high severity vulnerability.
How to fix CVE-2021-32811?
To fix CVE-2021-32811, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2021-32811 being actively exploited in the wild?
It is possible that CVE-2021-32811 is being exploited or will be exploited in a near future based on public information. According to its EPSS score, there is a ~4% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2021-32811?
CVE-2021-32811 affects zopefoundation Zope.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.