CVE-2020-9588: Magento Signature verification bypass
7.2
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.78046%
CWE
Published
5/24/2022
Updated
2/10/2025
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| magento/community-edition | composer | < 2.3.4-p2 | 2.3.4-p2 |
| magento/core | composer | < 1.9.4.5 | 1.9.4.5 |
| magento/project-community-edition | composer | <= 2.0.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from an observable timing discrepancy during signature verification. In PHP applications, this typically occurs when comparing cryptographic signatures using non-constant time string comparison methods. Magento's Security::compareStrings function is a prime candidate as it's responsible for secure string comparisons. The vulnerability description matches the pattern where such a function would use simple string equality checks (via '==' or early-exit comparisons) rather than constant-time algorithms like hash_equals(). While no direct patch code is available, this function's role in security-critical comparisons and the nature of the CWE-203 vulnerability strongly indicate it as the source.