First published: Tue Jun 25 2019(Updated: )
A remote code execution vulnerability exists in Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. An authenticated user with admin privileges to layouts can execute arbitrary code through a crafted XML layout update.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/magento/product-community-edition | >=2.1<2.1.18>=2.2<2.2.9>=2.3<2.3.2 | |
composer/magento/community-edition | >=2.3<2.3.2 | 2.3.2 |
composer/magento/community-edition | >=2.2<2.2.9 | 2.2.9 |
composer/magento/community-edition | >=2.1<2.1.18 | 2.1.18 |
CentOS Libgcc | >=2.1.0<2.1.18 | |
CentOS Libgcc | >=2.2.0<2.2.9 | |
CentOS Libgcc | >=2.3.0<2.3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-7895 is classified as a remote code execution vulnerability, which is considered highly severe due to its potential to allow unauthorized code execution.
To fix CVE-2019-7895, upgrade your Magento installation to version 2.1.18, 2.2.9, or 2.3.2 or later.
CVE-2019-7895 affects Magento 2.1 versions prior to 2.1.18, 2.2 versions prior to 2.2.9, and 2.3 versions prior to 2.3.2.
An authenticated user with admin privileges in the Magento system can exploit CVE-2019-7895 to execute arbitrary code.
CVE-2019-7895 creates the risk of unauthorized access and control over the server running the vulnerable Magento versions.