CVE-2023-29288: Magento Open Source allows Incorrect Authorization
4.3
Basic Information
Technical Details
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
magento/community-edition | composer | = 2.4.6 | |
magento/community-edition | composer | >= 2.4.5-p1, < 2.4.5-p3 | 2.4.5-p3 |
magento/community-edition | composer | >= 2.4.4-p1, < 2.4.4-p4 | 2.4.4-p4 |
magento/community-edition | composer | = 2.4.4 | |
magento/community-edition | composer | = 2.4.5 | |
magento/project-community-edition | composer | <= 2.0.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The provided vulnerability information (CVE-2023-29288) describes an Incorrect Authorization issue but does not include specific code examples, commit diffs, or patch details. The GitHub Advisory and NVD entry reference general authorization flaws in Adobe Commerce versions but do not explicitly name functions or files. Without concrete evidence of the vulnerable code paths (e.g., controller actions
, API endpoints
, or ACL checks
), it is impossible to identify specific functions with high confidence. The lack of GitHub patch/commit data further limits the ability to isolate the exact vulnerable functions. The vulnerability likely stems from missing or flawed authorization checks in privileged workflows, but the absence of implementation details prevents precise identification.