Miggo Logo

CVE-2025-24412: Magento Stored Cross-Site Scripting (XSS) Vulnerability

8.7

CVSS Score
3.1

Basic Information

EPSS Score
0.1521%
Published
2/11/2025
Updated
2/28/2025
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
magento/community-editioncomposer>= 2.4.7-beta1, < 2.4.7-p42.4.7-p4
magento/community-editioncomposer>= 2.4.6-p1, < 2.4.6-p92.4.6-p9
magento/community-editioncomposer>= 2.4.5-p1, < 2.4.5-p112.4.5-p11
magento/community-editioncomposer< 2.4.4-p122.4.4-p12
magento/community-editioncomposer= 2.4.7
magento/community-editioncomposer= 2.4.6
magento/community-editioncomposer= 2.4.5
magento/community-editioncomposer= 2.4.4
magento/community-editioncomposer= 2.4.8-beta1
magento/project-community-editioncomposer<= 2.0.2

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from improper output encoding in form field rendering mechanisms. While exact patch details are unavailable, Magento's XSS vulnerabilities typically occur in:

  1. Block rendering logic (AbstractBlock::toHtml) where dynamic content is injected into templates without escaping
  2. UI component form elements (AbstractElement::getHtml) that handle user-inputted values These components are central to form rendering across admin/frontend interfaces, aligning with the 'low-privileged attacker' scenario. Confidence is medium due to the pattern matching with historical Magento XSS issues, though unconfirmed without commit diffs.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

**o** *omm*r** v*rsions *.*.*-**t**, *.*.*-p*, *.*.*-p*, *.*.*-p**, *.*.*-p** *n* **rli*r *r* *****t** *y * stor** *ross-Sit* S*riptin* (XSS) vuln*r**ility t**t *oul* ** **us** *y * low-privil**** *tt**k*r to inj**t m*li*ious s*ripts into vuln*r**l*

Reasoning

T** vuln*r**ility st*ms *rom improp*r output *n*o*in* in *orm *i*l* r*n**rin* m****nisms. W*il* *x**t p*t** **t*ils *r* un*v*il**l*, M***nto's XSS vuln*r**iliti*s typi**lly o**ur in: *. *lo*k r*n**rin* lo*i* (**str**t*lo*k::to*tml) w**r* *yn*mi* *ont