This is a pre-production deployment of Warehouse, however changes made here WILL affect the production instance of PyPI.
Latest Version Dependencies status unknown Test status unknown Test coverage unknown
Project Description

Plone hotfix, 2016-04-19

This hotfix fixes several security issues:

  • An unauthorized changing of dexterity content in Plone. Archetypes content is not affected.
  • An attacker can potentially gain information on the ID of private content on your site. This is for all content.
  • A user who can create or edit templates can bypass Restricted Python. This is only when Chameleon is used, via the package.

This hotfix should be applied to the following versions of Plone:

  • Plone 5.0.4 and any version prior
  • Plone 4.3.9 and any version prior
  • Any older version of Plone

The hotfix is officially supported by the Plone security team on the following versions of Plone in accordance with the Plone version support policy: 4.0.10, 4.1.6, 4.2.7, 4.3.9 and 5.0.4. However it has also received some testing on older versions of Plone. The fixes included here will be incorporated into subsequent releases of Plone, so Plone 4.3.10, 5.0.5 and greater should not require this hotfix.


Installation instructions can be found at


Q: How can I confirm that the hotfix is installed correctly and my site is protected?

A: On startup, the hotfix will log a number of messages to the Zope event log that look like this:

2016-04-19 17:31:58 INFO Products.PloneHotfix20160419 Applied publishing patch
2016-04-19 17:31:58 INFO Products.PloneHotfix20160419 Applied dexterity patch
2016-04-19 17:31:58 INFO Products.PloneHotfix20160419 Applied five_pt patch
2016-04-19 17:31:58 INFO Products.PloneHotfix20160419 Hotfix installed

The exact number of patches applied, will differ depending on what packages you are using. If a patch is attempted but fails, it will be logged as a warning that says “Could not apply”. This may indicate that you have a non-standard Plone installation.

Q: How can I report problems installing the patch?
A: Contact the Plone security team at, or visit the #plone channel on freenode IRC.
Q: How can I report other potential security vulnerabilities?
A: Please email the security team at rather than discussing potential security issues publicly.


1.0 (2016-04-19)

  • Initial release
Release History

Release History


This version

History Node

TODO: Figure out how to actually get changelog content.

Changelog content for this version goes here.

Donec et mollis dolor. Praesent et diam eget libero egestas mattis sit amet vitae augue. Nam tincidunt congue enim, ut porta lorem lacinia consectetur. Donec ut libero sed arcu vehicula ultricies a non tortor. Lorem ipsum dolor sit amet, consectetur adipiscing elit.

Show More

Download Files

Download Files

TODO: Brief introduction on what you do with files - including link to relevant help section.

File Name & Checksum SHA256 Checksum Help Version File Type Upload Date (18.6 kB) Copy SHA256 Checksum SHA256 Source Apr 19, 2016

Supported By

WebFaction WebFaction Technical Writing Elastic Elastic Search Pingdom Pingdom Monitoring Dyn Dyn DNS HPE HPE Development Sentry Sentry Error Logging CloudAMQP CloudAMQP RabbitMQ Heroku Heroku PaaS Kabu Creative Kabu Creative UX & Design Fastly Fastly CDN DigiCert DigiCert EV Certificate Rackspace Rackspace Cloud Servers DreamHost DreamHost Log Hosting