First published: Tue Aug 10 2021(Updated: )
Magento Commerce versions 2.4.2 (and earlier), 2.4.2-p1 (and earlier) and 2.3.7 (and earlier) are affected by an improper input validation vulnerability while saving a customer's details with a specially crafted file. An authenticated attacker with admin privileges can leverage this vulnerability to achieve remote code execution.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Adobe Adobe Commerce | >=2.3.0<=2.3.7 | |
Adobe Adobe Commerce | >=2.4.0<=2.4.2 | |
Adobe Adobe Commerce | =2.4.2-p1 | |
Adobe Magento Open Source | >=2.3.0<=2.3.7 | |
Adobe Magento Open Source | >=2.4.0<=2.4.2 | |
Adobe Magento Open Source | =2.4.2-p1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-36025 is critical (7.2).
CVE-2021-36025 is an improper input validation vulnerability in Magento Commerce versions 2.4.2 (and earlier), 2.4.2-p1 (and earlier), and 2.3.7 (and earlier) when saving a customer's details with a specially crafted file.
Adobe Adobe Commerce versions 2.4.2 (and earlier), 2.4.2-p1 (and earlier), and 2.3.7 (and earlier) are affected by CVE-2021-36025.
Adobe Magento Open Source versions 2.4.2 (and earlier), 2.4.2-p1 (and earlier), and 2.3.7 (and earlier) are affected by CVE-2021-36025.
An authenticated attacker with admin privileges can exploit CVE-2021-36025 by leveraging the improper input validation vulnerability while saving a customer's details with a specially crafted file.