CVE-2020-24405:
Magento incorrect permissions vulnerability in the Inventory module
4.3
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.32398%
CWE
Published
5/24/2022
Updated
1/11/2024
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
magento/community-edition | composer | <= 2.3.5-p2 | 2.3.6 |
magento/community-edition | composer | >= 2.4.0, < 2.4.1 | 2.4.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability centers on improper authorization in the Inventory module. Magento typically uses controller ACL checks via _isAllowed() methods and interface-level permissions. For CVE-2020-24405:
- The Save controller action (Execute method) is a common attack vector for inventory modifications and would require explicit authorization checks that might have been missing.
- StockRepositoryInterface::Save is a core API method for inventory updates; improper exposure via web APIs without role-based restrictions could enable unauthorized access. The medium confidence for the second function stems from less specific evidence in public advisories, but it aligns with the vulnerability pattern.