-
CVSS Score
-A Semantic Attack on Google Gemini - Read the Latest Research
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| magento/community-edition | composer | >= 2.1.0, < 2.1.18 | 2.1.18 |
| magento/community-edition | composer | >= 2.2.0, < 2.2.9 | 2.2.9 |
| magento/community-edition | composer | >= 2.3.0, < 2.3.2 | 2.3.2 |
The vulnerability involves stored XSS in product catalog forms, which typically occurs when user-controlled input is rendered without proper escaping. The advisory specifically mentions catalog templates form handling. In Magento's architecture, the _prepareForm method in product edit blocks is responsible for initializing form fields. The vulnerability likely existed in how field values were rendered in associated templates without escaping. While the exact template line isn't visible, the parent form preparation method would appear in stack traces when processing malicious payloads.