CVSS 3.1 Score 6.1 of 10 (medium)


Published Jan 25, 2024
Updated: Feb 2, 2024


The CVE-2024-23055 vulnerability affects the Plone Docker Official Image 5.2.13 (5221) open-source software. It allows for remote code execution due to improper validation of input by the HOST headers. The vulnerability has a base severity rating of MEDIUM with a base score of 6.1 according to NVD. The exploitability score is 2.8, and privileges are not required for exploitation. User interaction is required, and the attack vector is through the network. The integrity and confidentiality impacts are both low, while the availability impact is none. The CVE poses a potential danger to organizations as it allows attackers to execute remote code on affected systems, potentially leading to unauthorized access or data breaches. Remediation measures should be taken promptly to address this vulnerability in order to protect organizational systems and data.

Explore Beyond the CVE Basics with Recorded Future's Vulnerability Intelligence

Note: This is just a basic overview providing quick insights into CVE-2024-23055 information. Gain full access to comprehensive CVE data, risk scores, prioritization, and mitigation data through Recorded Future's Vulnerability Intelligence:
  • Prioritize with Risk-Based Scoring
  • Explore the Extensive Vulnerability Database
  • Receive Early Alerts on Emerging CVEs
  • Focus on Critical Exploitable Vulnerabilities
  • Streamline Remediation with Integration Options