CVE-2022-24086: Magento improper input validation vulnerability
9.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.99595%
CWE
Published
2/17/2022
Updated
1/11/2024
KEV Status
Yes
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
magento/community-edition | composer | >= 2.3.3-p1, < 2.3.7-p3 | 2.3.7-p3 |
magento/community-edition | composer | >= 2.4.0, < 2.4.3-p2 | 2.4.3-p2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from improper input validation during checkout, specifically allowing unvalidated/unserialized user input to be processed. Magento's cart/checkout
flow heavily interacts with Quote/Address
attributes and cart update controllers. Custom attributes (via CustomAttributeList
) and cart update parameters (via UpdatePost
) are prime vectors for unchecked user input. Historical context shows Magento vulnerabilities often involve unserialize()
calls on user-controlled data (e.g., email fields). These functions are critical points where input validation was likely missing in vulnerable versions.