| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| magento/community-edition | composer |
| >= 2.4.7-beta1, < 2.4.7-p4 |
| 2.4.7-p4 |
| magento/community-edition | composer | >= 2.4.6-p1, < 2.4.6-p9 | 2.4.6-p9 |
| magento/community-edition | composer | >= 2.4.5-p1, < 2.4.5-p11 | 2.4.5-p11 |
| magento/community-edition | composer | < 2.4.4-p12 | 2.4.4-p12 |
| magento/community-edition | composer | = 2.4.7 |
| magento/community-edition | composer | = 2.4.6 |
| magento/community-edition | composer | = 2.4.5 |
| magento/community-edition | composer | = 2.4.4 |
| magento/community-edition | composer | = 2.4.8-beta1 |
| magento/project-community-edition | composer | <= 2.0.2 |
The vulnerability centers on improper access control in admin-facing controllers/APIs. Historical Magento vulnerabilities (e.g., CVE-2022-24086) show patterns where missing ACL checks in admin controllers or webapi.xml configurations allow privilege escalation. The described exploit scenario (privilege escalation without user interaction) suggests unprotected admin routes or API endpoints. Common vulnerable patterns include:
KEV Misses 88% of Exploited CVEs- Get the report