| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| magento/community-edition | composer |
| < 2.3.6 |
| 2.3.6 |
| magento/community-edition | composer | >= 2.4.0, < 2.4.1-p1 | 2.4.1-p1 |
| magento/project-community-edition | composer | <= 2.0.2 |
The vulnerability stems from improper output sanitization in the admin notification preview flow. Analysis of Magento's security patches reveals that the fix involved adding HTML escaping to title parameters in both the Block class (via escapeHtml) and template rendering. The Preview controller's handling of request parameters without validation() creates the injection vector. These components directly map to the described stored XSS attack pattern requiring admin privileges.
KEV Misses 88% of Exploited CVEs- Get the report