CVE-2019-8142:
Magento 2 Community Edition XSS Vulnerability
5.4
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.39787%
CWE
Published
5/24/2022
Updated
2/2/2024
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
magento/community-edition | composer | >= 2.2.0, < 2.2.10 | 2.2.10 |
magento/community-edition | composer | >= 2.3.0, < 2.3.2-p1 | 2.3.2-p1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from unsanitized handling of payment method titles during configuration and rendering. Magento's payment method configuration flow involves saving user-provided titles (via admin controllers) and displaying them in multiple contexts. The AbstractMethod::getTitle() is a core method for retrieving payment titles, and Container::setMethodForm is a key rendering point. The absence of output escaping in these critical points (as implied by the XSS nature) makes them likely candidates. Confidence is high for the rendering function due to XSS patterns, and medium for the getter due to lack of explicit patch details.