First published: Tue Aug 10 2021(Updated: )
Magento Commerce versions 2.4.2 (and earlier), 2.4.2-p1 (and earlier) and 2.3.7 (and earlier) are affected by a stored cross-site scripting vulnerability in the customer address upload feature that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Adobe Adobe Commerce | >=2.3.0<=2.3.7 | |
Adobe Adobe Commerce | >=2.4.0<=2.4.2 | |
Adobe Adobe Commerce | =2.4.2-p1 | |
Adobe Magento Open Source | >=2.3.0<=2.3.7 | |
Adobe Magento Open Source | >=2.4.0<=2.4.2 | |
Adobe Magento Open Source | =2.4.2-p1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-36026 is a vulnerability in Magento Commerce versions 2.4.2 (and earlier), 2.4.2-p1 (and earlier), and 2.3.7 (and earlier) that allows an attacker to inject malicious scripts into vulnerable form fields using a stored cross-site scripting (XSS) attack.
Adobe Adobe Commerce versions between 2.3.0 and 2.3.7 are affected by CVE-2021-36026.
Adobe Magento Open Source versions between 2.3.0 and 2.3.7 are affected by CVE-2021-36026.
To fix CVE-2021-36026, update Magento Commerce to version 2.4.2-p1 or later if you are using version 2.4.2, or update to version 2.3.8 or later if you are using version 2.3.x.
CVE-2021-36026 has a severity rating of medium (6.1) according to the Common Vulnerability Scoring System (CVSS).