Miggo Logo

CVE-2023-29288: Magento Open Source allows Incorrect Authorization

4.3

CVSS Score
3.1

Basic Information

EPSS Score
0.4053%
Published
6/15/2023
Updated
3/4/2025
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
magento/community-editioncomposer= 2.4.6
magento/community-editioncomposer>= 2.4.5-p1, < 2.4.5-p32.4.5-p3
magento/community-editioncomposer>= 2.4.4-p1, < 2.4.4-p42.4.4-p4
magento/community-editioncomposer= 2.4.4
magento/community-editioncomposer= 2.4.5
magento/project-community-editioncomposer<= 2.0.2

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The provided vulnerability information (CVE-2023-29288) describes an Incorrect Authorization issue but does not include specific code examples, commit diffs, or patch details. The GitHub Advisory and NVD entry reference general authorization flaws in Adobe Commerce versions but do not explicitly name functions or files. Without concrete evidence of the vulnerable code paths (e.g., controller actions, API endpoints, or ACL checks), it is impossible to identify specific functions with high confidence. The lack of GitHub patch/commit data further limits the ability to isolate the exact vulnerable functions. The vulnerability likely stems from missing or flawed authorization checks in privileged workflows, but the absence of implementation details prevents precise identification.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

**o** *omm*r** v*rsions *.*.* (*n* **rli*r), *.*.*-p* (*n* **rli*r) *n* *.*.*-p* (*n* **rli*r) *r* *****t** *y *n In*orr**t *ut*oriz*tion vuln*r**ility t**t *oul* r*sult in * s**urity ***tur* *yp*ss. * privil**** *tt**k*r *oul* l*v*r*** t*is vuln*r**

Reasoning

T** provi*** vuln*r**ility in*orm*tion (*V*-****-*****) **s*ri**s *n In*orr**t *ut*oriz*tion issu* *ut *o*s not in*lu** sp**i*i* *o** *x*mpl*s, *ommit *i**s, or p*t** **t*ils. T** *it*u* **visory *n* NV* *ntry r***r*n** **n*r*l *ut*oriz*tion *l*ws in