First published: Thu Feb 11 2021(Updated: )
Magento versions 2.4.1 (and earlier), 2.4.0-p1 (and earlier) and 2.3.6 (and earlier) are affected by a cross-site request forgery (CSRF) vulnerability via the GraphQL API. Successful exploitation could lead to unauthorized modification of customer metadata by an unauthenticated attacker. Access to the admin console is not required for successful exploitation.
Credit: psirt@adobe.com psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/magento/community-edition | >=2.4.0<2.4.2 | 2.4.2 |
composer/magento/community-edition | <2.3.6-p1 | 2.3.6-p1 |
Magento Magento | <2.3.6 | |
Magento Magento | <2.3.6 | |
Magento Magento | =2.3.6 | |
Magento Magento | =2.3.6 | |
Magento Magento | =2.4.0 | |
Magento Magento | =2.4.0 | |
Magento Magento | =2.4.0-p1 | |
Magento Magento | =2.4.0-p1 | |
Magento Magento | =2.4.1 | |
Magento Magento | =2.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Magento vulnerability is CVE-2021-21027.
Magento versions 2.4.1 (and earlier), 2.4.0-p1 (and earlier), and 2.3.6 (and earlier) are affected by this vulnerability.
The severity of CVE-2021-21027 is medium.
Successful exploitation of this vulnerability could lead to unauthorized modification of customer metadata by an unauthenticated attacker.
Yes, a fix is available. Please refer to the provided reference for more information.