First published: Wed Sep 06 2023(Updated: )
Magento versions 2.4.2 (and earlier), 2.4.2-p1 (and earlier) and 2.3.7 (and earlier) are affected by an Improper input validation vulnerability within the CMS page scheduled update feature. An authenticated attacker with administrative privilege could leverage this vulnerability to achieve remote code execution on the system.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
CentOS Libgcc | <2.3.7 | |
CentOS Libgcc | <2.3.7 | |
CentOS Libgcc | >=2.4.0<2.4.2 | |
CentOS Libgcc | >=2.4.0<2.4.2 | |
CentOS Libgcc | =2.3.7 | |
CentOS Libgcc | =2.3.7 | |
CentOS Libgcc | =2.4.2 | |
CentOS Libgcc | =2.4.2 | |
CentOS Libgcc | =2.4.2-p1 | |
CentOS Libgcc | =2.4.2-p1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Magento vulnerability is CVE-2021-36021.
Magento versions 2.4.2 (and earlier), 2.4.2-p1 (and earlier), and 2.3.7 (and earlier) are affected by this vulnerability.
The severity of CVE-2021-36021 is high with a CVSS score of 7.2.
An authenticated attacker with administrative privilege could leverage this vulnerability to achieve remote code execution.
Yes, a patch is available. Please refer to the official Magento website for more information.