CVE-2019-8228: Withdrawn Advisory: Magento 2 Community Edition XSS Vulnerability
4.8
Basic Information
Technical Details
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
magento/community-edition | composer | < 1.9.4.3 | 1.9.4.3 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability involves stored XSS in transactional email templates. The attack vector implies:- 1) Malicious input is stored when saving template content (handled by controller)- 2) XSS triggers when rendering the template in admin interface (handled by form block).
While the controller's saveAction (Mage_Adminhtml_System_Email_TemplateController::saveAction) processes input, the actual XSS exploitation occurs during output rendering. In Magento's architecture, the _prepareForm method in the email template edit form block is responsible for populating form field values. Without proper escaping here, stored JavaScript would execute when admins view the template. This matches the pattern of Magento's historical XSS fixes where escapeHtml() was added to form field values.