-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerability stems from missing HTML escaping in system config value retrieval. The commit patching this issue wraps Mage::getStoreConfig() calls with Mage_Core_Model_Security_HtmlEscapedString to enforce escaping. The affected functions directly returned unescaped config values (logo_src, logo_src_small, logo_alt, welcome) from system settings. These values were rendered in templates without proper sanitization, allowing XSS payload execution. The high confidence comes from the direct correlation between the patched functions and the vulnerability description, confirmed by the commit diff showing escaping was added to these specific methods.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| openmage/magento-lts | composer | < 20.10.1 | 20.10.1 |
Ongoing coverage of React2Shell