-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| magento/community-edition | composer | >= 2.4.7-beta1, < 2.4.7-p4 | 2.4.7-p4 |
| magento/community-edition | composer | >= 2.4.6-p1, < 2.4.6-p9 | 2.4.6-p9 |
| magento/community-edition | composer | >= 2.4.5-p1, < 2.4.5-p11 | 2.4.5-p11 |
| magento/community-edition | composer | < 2.4.4-p12 | 2.4.4-p12 |
| magento/community-edition | composer | = 2.4.7 | |
| magento/community-edition | composer | = 2.4.6 | |
| magento/community-edition | composer | = 2.4.5 | |
| magento/community-edition | composer | = 2.4.4 | |
| magento/community-edition | composer | = 2.4.8-beta1 | |
| magento/project-community-edition | composer | <= 2.0.2 |
The vulnerability involves unauthenticated path traversal leading to file modification. Common attack vectors in Magento include file upload handlers, path resolution utilities, and validation logic. These functions were selected because: (1) MediaStorage's extension validator is a known weak point for bypass attempts, (2) DirectoryResolver is critical for path containment, and (3) CMS file upload controllers often process user-supplied filenames. Confidence is medium due to the absence of explicit patch details, but the choices align with Magento's architecture and historical path traversal patterns (e.g., CVE-2022-24086).
Ongoing coverage of React2Shell