CVE-2019-7937: Magento 2 Community Edition XSS Vulnerability
4.8
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.3017%
CWE
Published
5/24/2022
Updated
2/12/2024
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| magento/community-edition | composer | >= 2.1.0, < 2.1.18 | 2.1.18 |
| magento/community-edition | composer | >= 2.2.0, < 2.2.9 | 2.2.9 |
| magento/community-edition | composer | >= 2.3.0, < 2.3.2 | 2.3.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability involves stored XSS via product attribute storage, requiring privileges to modify attributes. The Save controller action is the primary entry point for processing attribute data. Historical Magento XSS vulnerabilities often stem from unsanitized input in admin controllers. The lack of output escaping in admin templates or input sanitization during attribute persistence would enable this exploit. The execute() method in the Save controller is the most logical point where unsanitized user input enters the system, matching the attack vector described.