First published: Tue Feb 09 2021(Updated: )
Magento versions 2.4.1 (and earlier), 2.4.0-p1 (and earlier) and 2.3.6 (and earlier) are affected by an improper authorization vulnerability in the integrations module. Successful exploitation could lead to unauthorized access to restricted resources by an unauthenticated attacker. Access to the admin console is required for successful exploitation.
Credit: psirt@adobe.com psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/magento/community-edition | >=2.4.0<2.4.2 | 2.4.2 |
composer/magento/community-edition | <2.3.6-p1 | 2.3.6-p1 |
Magento Magento | <2.3.6 | |
Magento Magento | <2.3.6 | |
Magento Magento | =2.3.6 | |
Magento Magento | =2.3.6 | |
Magento Magento | =2.4.0 | |
Magento Magento | =2.4.0 | |
Magento Magento | =2.4.0-p1 | |
Magento Magento | =2.4.0-p1 | |
Magento Magento | =2.4.1 | |
Magento Magento | =2.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-21026.
CVE-2021-21026 has a severity rating of medium, with a CVSS score of 5.3.
Magento versions 2.4.1 (and earlier), 2.4.0-p1 (and earlier), and 2.3.6 (and earlier) are affected by CVE-2021-21026.
Successful exploitation of CVE-2021-21026 could lead to unauthorized access to restricted resources by an unauthenticated attacker.
Yes, patch updates are available for the affected versions of Magento. It is recommended to update to the latest patched version to mitigate the vulnerability.