First published: Tue Jun 25 2019(Updated: )
A stored cross-site scripting vulnerability exists in the admin panel of Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. This could be exploited by an authenticated user with privileges to modify content block titles to inject malicious javascript.
Credit: psirt@adobe.com psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/magento/product-community-edition | >=2.1<2.1.18>=2.2<2.2.9>=2.3<2.3.2 | |
composer/magento/community-edition | >=2.1.0<2.1.18 | 2.1.18 |
composer/magento/community-edition | >=2.2.0<2.2.9 | 2.2.9 |
composer/magento/community-edition | >=2.3.0<2.3.2 | 2.3.2 |
Magento | >=2.1.0<2.1.18 | |
Magento | >=2.2.0<2.2.9 | |
Magento | >=2.3.0<2.3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-7936 has a moderate severity rating as it allows stored cross-site scripting vulnerabilities in Magento's admin panel.
To fix CVE-2019-7936, upgrade to Magento version 2.1.18, 2.2.9, or 2.3.2 or later.
CVE-2019-7936 affects Magento versions prior to 2.1.18, 2.2.9, and 2.3.2.
No, an attacker must be an authenticated user with privileges to modify content block titles to exploit CVE-2019-7936.
CVE-2019-7936 can allow an attacker to inject malicious JavaScript into the Magento admin panel, posing security risks.