First published: Tue Oct 08 2019(Updated: )
A reflected cross-site scripting (XSS) vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. An authenticated user can inject arbitrary JavaScript code via email template preview.
Credit: psirt@adobe.com psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/magento/product-community-edition | >=2.2<2.2.10>=2.3<2.3.2-p2 | |
composer/magento/community-edition | >=2.3.0<2.3.2-p1 | 2.3.2-p1 |
composer/magento/community-edition | >=2.2.0<2.2.10 | 2.2.10 |
Magento | >=2.2.0<2.2.10 | |
Magento | >=2.2.0<2.2.10 | |
Magento | >=2.3.0<2.3.2 | |
Magento | >=2.3.0<2.3.2 | |
Magento | =2.3.2 | |
Magento | =2.3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-8092 is classified as a reflected cross-site scripting (XSS) vulnerability with a high severity level.
To mitigate CVE-2019-8092, upgrade to Magento versions 2.2.10 or 2.3.3 or later, which address this vulnerability.
Authenticated users of Magento 2.2 versions prior to 2.2.10 and Magento 2.3 versions before 2.3.3 are vulnerable to CVE-2019-8092.
Attackers can exploit CVE-2019-8092 to inject arbitrary JavaScript code into email templates, potentially compromising user data.
Yes, patches are included in Magento versions 2.2.10 and 2.3.3, which resolve the issue related to CVE-2019-8092.