CVE-2021-21016:
Magento OS command injection via the WebAPI
9.1
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.88276%
CWE
Published
5/24/2022
Updated
2/10/2025
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
magento/community-edition | composer | < 2.3.6-p1 | 2.3.6-p1 |
magento/community-edition | composer | >= 2.4.0, < 2.4.2 | 2.4.2 |
magento/project-community-edition | composer | <= 2.0.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The analysis focused on identifying functions related to input validation, CAPTCHA, and payment processing, as these are relevant to the OS command injection vulnerability via WebAPI. The patches suggest that improvements were made to CAPTCHA validation and rate limiting, which could be related to mitigating the vulnerability.