First published: Fri Jun 26 2020(Updated: )
Magento versions 2.3.4 and earlier, 2.2.11 and earlier (see note), 1.14.4.4 and earlier, and 1.9.4.4 and earlier have a security mitigation bypass vulnerability. Successful exploitation could lead to arbitrary code execution.
Credit: psirt@adobe.com psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/magento/core | <1.9.4.5 | 1.9.4.5 |
composer/magento/community-edition | <=2.2.11 | |
composer/magento/community-edition | >=2.3.0<2.3.4-p2 | 2.3.4-p2 |
Magento Magento | <=1.9.4.4 | |
Magento Magento | <=1.14.4.4 | |
Magento Magento | >=2.2.0<=2.2.11 | |
Magento Magento | >=2.2.0<=2.2.11 | |
Magento Magento | >=2.3.0<=2.3.4 | |
Magento Magento | >=2.3.0<=2.3.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-9631 is a security mitigation bypass vulnerability in Magento versions 2.3.4 and earlier, 2.2.11 and earlier, 1.14.4.4 and earlier, and 1.9.4.4 and earlier.
CVE-2020-9631 has a severity rating of 9.8 (Critical).
CVE-2020-9631 affects Magento versions 2.3.4 and earlier, 2.2.11 and earlier, 1.14.4.4 and earlier, and 1.9.4.4 and earlier. It allows for a security mitigation bypass and can result in arbitrary code execution.
To mitigate CVE-2020-9631 in Magento, it is recommended to update to the latest version available, which addresses the vulnerability.
You can find more information about CVE-2020-9631 at the following link: [https://helpx.adobe.com/security/products/magento/apsb20-22.html](https://helpx.adobe.com/security/products/magento/apsb20-22.html)