CVE-2019-8128: Magento Cross-Site Scripting via store name
5.4
Basic Information
Technical Details
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
magento/community-edition | composer | >= 2.2, < 2.2.10 | 2.2.10 |
magento/community-edition | composer | >= 2.3, < 2.3.2-p1 | 2.3.2-p1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The provided information does not include specific code snippets, commit diffs, or patch details that would allow precise identification of vulnerable functions. While the vulnerability clearly stems from insufficient output escaping of the store name value in templates or rendering logic, Magento's architecture typically handles XSS vulnerabilities through template escaping mechanisms rather than discrete functions. Without access to the actual patched code changes or specific file references from Magento's security fix, we cannot confidently map this to specific PHP functions with high certainty. The root cause likely resides in template files (.phtml) lacking proper escape methods like escapeHtml() when rendering the store name, but these template elements are not functions in the traditional sense.