First published: Tue Jun 25 2019(Updated: )
A stored cross-site scripting vulnerability exists in the admin panel of Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. This could be exploited by an authenticated user with privileges to edit product content pages to inject malicious javascript.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/magento/product-community-edition | >=2.1<2.1.18>=2.2<2.2.9>=2.3<2.3.2 | |
composer/magento/community-edition | >=2.3.0<2.3.2 | 2.3.2 |
composer/magento/community-edition | >=2.2.0<2.2.9 | 2.2.9 |
composer/magento/community-edition | >=2.1.0<2.1.18 | 2.1.18 |
CentOS Libgcc | >=2.1.0<2.1.18 | |
CentOS Libgcc | >=2.2.0<2.2.9 | |
CentOS Libgcc | >=2.3.0<2.3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-7927 is classified as a stored cross-site scripting vulnerability with a medium severity that affects Magento versions prior to 2.1.18, 2.2.9, and 2.3.2.
To fix CVE-2019-7927, you should update your Magento installation to version 2.1.18, 2.2.9, or 2.3.2.
CVE-2019-7927 affects authenticated users of Magento versions prior to 2.1.18, 2.2.9, and 2.3.2 with privileges to edit product content pages.
An attacker exploiting CVE-2019-7927 can inject malicious JavaScript into product content pages through the admin panel.
CVE-2019-7927 is not classified as critical but poses a significant security risk, especially if exploited in a production environment.