CVE-2020-24402: Magento incorrect permissions vulnerability in the Integrations component
4.9
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.41301%
CWE
Published
5/24/2022
Updated
2/10/2025
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| magento/community-edition | composer | < 2.3.6 | 2.3.6 |
| magento/community-edition | composer | = 2.4.0 | 2.4.1 |
| magento/project-community-edition | composer | <= 2.0.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from two key factors: 1) Incorrect default permissions in integration configuration (CWE-276) allowing broader API access than intended, and 2) Missing authorization checks (CWE-285) in customer deletion workflows. While exact code isn't available, pattern analysis suggests:
- Integration management controllers likely fail to properly validate caller context when handling API requests
- CustomerRepositoryInterface implementations may not enforce authorization when invoked via integration tokens. The medium confidence reflects the lack of direct patch/diff evidence, but aligns with Magento's architecture where API endpoints map to controller actions and repository services.