CVE-2019-8143:
Magento Injection vulnerability via email templates
6.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.37942%
CWE
Published
5/24/2022
Updated
5/15/2024
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
magento/community-edition | composer | >= 2.2, < 2.2.10 | 2.2.10 |
magento/community-edition | composer | >= 2.3, < 2.3.2-p1 | 2.3.2-p1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability involves SQL injection via email templates, which are managed through Magento's email template resource model. The loadByCode method is a prime candidate as it handles template loading based on user-provided identifiers. In unpatched versions, this method likely used raw SQL interpolation with user-controlled 'template_code' values, allowing attackers to inject malicious SQL. The patch would have introduced parameterized queries or proper escaping in this method. The confidence is high because this pattern matches the described attack vector and Magento's typical resource model architecture.