Miggo Logo

CVE-2023-38250: Magento Open Source allows SQL Injection

8.1

CVSS Score
3.1

Basic Information

EPSS Score
0.81576%
Published
10/13/2023
Updated
3/4/2025
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
magento/community-editioncomposer= 2.4.7-beta12.4.7-beta2
magento/community-editioncomposer= 2.4.7
magento/community-editioncomposer= 2.4.6
magento/community-editioncomposer= 2.4.5
magento/community-editioncomposer= 2.4.4
magento/community-editioncomposer>= 2.4.6-p1, < 2.4.6-p32.4.6-p3
magento/community-editioncomposer>= 2.4.5-p1, < 2.4.5-p52.4.5-p5
magento/community-editioncomposer>= 2.4.4-p1, < 2.4.4-p62.4.4-p6
magento/project-community-editioncomposer<= 2.0.2

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The provided vulnerability information lacks critical technical details needed to identify specific vulnerable functions. While the CWE-89 classification confirms SQL injection exists, there are no commit diffs, patch details, or code examples showing the vulnerable implementation. The advisory mentions exploitation requires admin privileges and non-UI tooling knowledge, suggesting the vulnerability might exist in backend/admin controllers or data processing utilities, but without concrete evidence of: 1) raw SQL query construction patterns, 2) parameter binding bypasses, or 3) specific user input handling methods, we cannot confidently identify exact functions. Magento's architecture typically uses ORM/Zend_Db abstractions that prevent SQLi, so the vulnerability likely involves an edge case where these protections were bypassed - but the absence of patch details makes confirmation impossible.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

**o** *omm*r** v*rsions *.*.*-**t** (*n* **rli*r), *.*.*-p* (*n* **rli*r), *.*.*-p* (*n* **rli*r) *n* *.*.*-p* (*n* **rli*r) *r* *****t** *y *n Improp*r N*utr*liz*tion o* Sp**i*l *l*m*nts us** in *n SQL *omm*n* ('SQL Inj**tion') vuln*r**ility t**t *o

Reasoning

T** provi*** vuln*r**ility in*orm*tion l**ks *riti**l t***ni**l **t*ils n***** to i**nti*y sp**i*i* vuln*r**l* *un*tions. W*il* t** *W*-** *l*ssi*i**tion *on*irms SQL inj**tion *xists, t**r* *r* no *ommit *i**s, p*t** **t*ils, or *o** *x*mpl*s s*owin