CVE-2019-7950: Magento 2 Community Edition Access Control Bypass
7.5
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.64368%
CWE
Published
5/24/2022
Updated
2/2/2024
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| magento/community-edition | composer | >= 2.1.0, < 2.1.18 | 2.1.18 |
| magento/community-edition | composer | >= 2.2.0, < 2.2.9 | 2.2.9 |
| magento/community-edition | composer | >= 2.3.0, < 2.3.2 | 2.3.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability involves unauthenticated REST API calls manipulating company assignments. The primary entry point would be the REST controller handling customer/company assignment requests (Assign::execute), which lacked authentication enforcement. The business logic method (CompanyAssignment::assignCustomerToCompany) would then process the user-controlled company ID without proper authorization checks, enabling the bypass. This matches CWE-639's pattern of authorization bypass through user-controlled keys (company IDs in this case).