CVE-2022-35698: Magento Open Source allows Stored Cross-Site Scripting (Stored XSS)
10
Basic Information
Technical Details
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
magento/community-edition | composer | = 2.4.4-p1 | |
magento/community-edition | composer | = 2.4.4 | |
magento/community-edition | composer | = 2.4.5 | |
magento/community-edition | composer | >= 2.4.3-p1, <= 2.4.3-p3 | |
magento/community-edition | composer | = 2.4.3 | |
magento/project-community-edition | composer | <= 2.0.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The provided vulnerability information describes a Stored XSS issue (CWE-79) but does not include specific code examples, commit diffs, or patch details that would allow identification of exact vulnerable functions. While the advisory indicates the vulnerability involves improper input neutralization during web page generation, Magento's architecture contains multiple layers where this could occur (e.g., controllers
handling user input, template
rendering functions, or data
persistence layers). However, without concrete evidence from code changes or vendor-supplied technical details about the vulnerability mechanism, we cannot confidently specify particular functions or file paths. The post-authentication requirement suggests the vulnerability might exist in admin
panel
functionality, but this remains speculative without further technical documentation.