CVE-2020-3719:
Magento sql injection vulnerability
7.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.80372%
CWE
Published
5/24/2022
Updated
1/11/2024
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
magento/community-edition | composer | >= 2.3.0, <= 2.3.3 | 2.3.4 |
magento/community-edition | composer | <= 2.2.10 | 2.2.11 |
magento/core | composer | < 1.9.4.4 | 1.9.4.4 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The provided vulnerability reports (CVE-2020-3719, GHSA-rr59-pjwj-6grj) lack specific technical details about the vulnerable code paths, such as commit diffs, patch descriptions, or explicit function
names. While the CWE-89 classification confirms SQL injection, Magento's architecture involves complex query generation across multiple layers (e.g., EAV models, REST/GraphQL
APIs, search criteria handlers). Without concrete evidence from patches or exploit analyses, it is not possible to identify specific functions
with high confidence. The vulnerability likely stems from improper input sanitization in search or filter logic, but the absence of code-level data prevents precise attribution to particular functions
.