First published: Thu Feb 11 2021(Updated: )
Magento versions 2.4.1 (and earlier), 2.4.0-p1 (and earlier) and 2.3.6 (and earlier) are affected by a Reflected Cross-site Scripting vulnerability via 'file' parameter. Successful exploitation could lead to arbitrary JavaScript execution in the victim's browser. Access to the admin console is required for successful exploitation.
Credit: psirt@adobe.com psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Magento Magento | <2.3.6 | |
Magento Magento | <2.3.6 | |
Magento Magento | =2.3.6 | |
Magento Magento | =2.3.6 | |
Magento Magento | =2.4.0 | |
Magento Magento | =2.4.0 | |
Magento Magento | =2.4.0-p1 | |
Magento Magento | =2.4.0-p1 | |
Magento Magento | =2.4.1 | |
Magento Magento | =2.4.1 | |
composer/magento/community-edition | >=2.4.0<2.4.2 | 2.4.2 |
composer/magento/community-edition | <2.3.6-p1 | 2.3.6-p1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this Magento vulnerability is CVE-2021-21029.
Magento versions 2.4.1 (and earlier), 2.4.0-p1 (and earlier), and 2.3.6 (and earlier) are affected by this vulnerability.
The severity of CVE-2021-21029 is medium with a CVSS score of 4.8.
Successful exploitation of this vulnerability could lead to arbitrary JavaScript execution in the victim's browser.
To fix CVE-2021-21029, it is recommended to update Magento to version 2.4.2 or apply the necessary patches provided by Magento.