-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| magento/community-edition | composer | >= 2.1, < 2.1.18 | 2.1.18 |
| magento/community-edition | composer | >= 2.2, < 2.2.9 | 2.2.9 |
| magento/community-edition | composer | >= 2.3, < 2.3.2 | 2.3.2 |
The vulnerability affects authenticated users with product/category access and involves stored XSS in admin panels. Core product/category editing interfaces are the most likely vectors. While exact patch details are unavailable, Magento's attribute rendering system (particularly text input handling in admin forms) is a common XSS surface area. The Text attribute renderer specifically handles raw user input for product attributes, and category forms manage structured data - both would require proper escaping when rendering admin UI elements. The confidence is high because these components directly handle user-controllable data display in the vulnerable admin interface context.
Ongoing coverage of React2Shell