Miggo Logo

CVE-2019-7862:
Magento 2 Community Edition XSS Vulnerability

4.8

CVSS Score
3.0

Basic Information

EPSS Score
0.27665%
Published
5/24/2022
Updated
2/12/2024
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
magento/community-editioncomposer>= 2.1.0, < 2.1.182.1.18
magento/community-editioncomposer>= 2.2.0, < 2.2.92.2.9
magento/community-editioncomposer>= 2.3.0, < 2.3.22.3.2

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability is a reflected XSS in the Product widget chooser, which implies improper sanitization of user input during rendering. Magento's widget system uses controllers to handle parameters and blocks/templates to render UI components. The Chooser controller's execute method is the entry point for processing widget parameters, and the associated block's _toHtml method is responsible for generating HTML. Without proper escaping in these components, user-supplied input (e.g., from URL parameters) would be reflected in the admin panel/modules/plugins/. The high confidence for the controller stems from its role in handling raw input, while the block/template has medium confidence due to inferred lack of escaping without direct patch evidence.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

* r**l**t** *ross-sit* s*riptin* vuln*r**ility *xists in t** Pro*u*t wi***t **oos*r *un*tion*lity in t** **min p*n*l *or M***nto *.* prior to *.*.**, M***nto *.* prior to *.*.*, M***nto *.* prior to *.*.*.

Reasoning

T** vuln*r**ility is * r**l**t** XSS in t** Pro*u*t wi***t **oos*r, w*i** impli*s improp*r s*nitiz*tion o* us*r input *urin* r*n**rin*. M***nto's wi***t syst*m us*s *ontroll*rs to **n*l* p*r*m*t*rs *n* *lo*ks/t*mpl*t*s to r*n**r UI *ompon*nts. T** **