First published: Tue Jun 25 2019(Updated: )
A stored cross-site scripting vulnerability exists in the admin panel of Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. This could be exploited by an authenticated user with privileges to modify node attributes to inject malicious javascript.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/magento/product-community-edition | >=2.1<2.1.18>=2.2<2.2.9>=2.3<2.3.2 | |
composer/magento/community-edition | >=2.3.0<2.3.2 | 2.3.2 |
composer/magento/community-edition | >=2.2.0<2.2.9 | 2.2.9 |
composer/magento/community-edition | >=2.1.0<2.1.18 | 2.1.18 |
CentOS Libgcc | >=2.1.0<2.1.18 | |
CentOS Libgcc | >=2.2.0<2.2.9 | |
CentOS Libgcc | >=2.3.0<2.3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-7926 has a medium severity level due to the potential for authenticated users to inject malicious JavaScript.
To fix CVE-2019-7926, upgrade Magento to version 2.1.18, 2.2.9, or 2.3.2 or later.
CVE-2019-7926 affects Magento 2.1 versions before 2.1.18, 2.2 versions before 2.2.9, and 2.3 versions before 2.3.2.
CVE-2019-7926 can be exploited by authenticated users who have privileges to modify node attributes.
CVE-2019-7926 is classified as a stored cross-site scripting (XSS) vulnerability.