First published: Mon Jun 28 2021(Updated: )
Magento versions 2.4.2 (and earlier), 2.4.1-p1 (and earlier) and 2.3.6-p1 (and earlier) are affected by an Improper input validation vulnerability in the New customer WebAPI.Successful exploitation could allow an attacker to send unsolicited spam e-mails.
Credit: psirt@adobe.com psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/magento/community-edition | <2.3.7 | 2.3.7 |
composer/magento/community-edition | >=2.4.0<2.4.2-p1 | 2.4.2-p1 |
Magento Magento | <2.3.6 | |
Magento Magento | <2.3.6 | |
Magento Magento | =2.3.6 | |
Magento Magento | =2.3.6 | |
Magento Magento | =2.3.6-p1 | |
Magento Magento | =2.3.6-p1 | |
Magento Magento | =2.4.1 | |
Magento Magento | =2.4.1 | |
Magento Magento | =2.4.1-p1 | |
Magento Magento | =2.4.1-p1 | |
Magento Magento | =2.4.2 | |
Magento Magento | =2.4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Magento vulnerability is CVE-2021-28585.
The severity of CVE-2021-28585 is medium (5.3).
Magento versions 2.4.2 (and earlier), 2.4.1-p1 (and earlier), and 2.3.6-p1 (and earlier) are affected by CVE-2021-28585.
Successful exploitation of CVE-2021-28585 could allow an attacker to send unsolicited spam e-mails.
You can find more information about CVE-2021-28585 at the following link: [link](https://helpx.adobe.com/security/products/magento/apsb21-30.html)