-
CVSS Score
-A Semantic Attack on Google Gemini - Read the Latest Research
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| magento/community-edition | composer | >= 2.1.0, < 2.1.18 | 2.1.18 |
| magento/community-edition | composer | >= 2.2.0, < 2.2.9 | 2.2.9 |
| magento/community-edition | composer | > 2.3.0, < 2.3.2 | 2.3.2 |
The vulnerability requires manipulation of store currency options, which are handled by the CurrencySymbol module. The saveCurrencySymbols method is directly responsible for persisting currency symbol configurations. Since the exploit requires stored XSS via currency settings, insufficient sanitization in this method would allow payloads to be saved and later executed. This aligns with Magento's architecture where backend models handle configuration data storage, and the absence of patch details suggests the vulnerability stems from missing sanitization in this critical data persistence point.