-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerability stems from improper handling of user input in email template configuration. Marketing users with access to email template variables could manipulate the 'config_path' parameter, which was directly interpolated into SQL queries without parameterization. The loadByConfigPath method in Magento\Email\Model\Template is a known vector for this vulnerability, as it uses the attacker-controlled value to build a WHERE clause in a raw SQL query. This matches the CWE-89 pattern and the described attack scenario.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| magento/community-edition | composer | >= 2.2, < 2.2.10 | 2.2.10 |
| magento/community-edition | composer | >= 2.3, < 2.3.2-p1 | 2.3.2-p1 |
Ongoing coverage of React2Shell