First published: Tue Aug 10 2021(Updated: )
Magento Commerce versions 2.4.2 (and earlier), 2.4.2-p1 (and earlier) and 2.3.7 (and earlier) are affected by an XML Injection vulnerability when saving a configurable product. An attacker with admin privileges can trigger a specially crafted script to achieve remote code execution.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Adobe Adobe Commerce | >=2.3.0<=2.3.7 | |
Adobe Adobe Commerce | >=2.4.0<=2.4.2 | |
Adobe Adobe Commerce | =2.4.2-p1 | |
Adobe Magento Open Source | >=2.3.0<=2.3.7 | |
Adobe Magento Open Source | >=2.4.0<=2.4.2 | |
Adobe Magento Open Source | =2.4.2-p1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-36028 is an XML Injection vulnerability in Magento Commerce versions 2.4.2 (and earlier), 2.4.2-p1 (and earlier), and 2.3.7 (and earlier), which allows an attacker with admin privileges to achieve remote code execution.
CVE-2021-36028 affects Adobe Commerce versions 2.3.0 to 2.3.7, 2.4.0 to 2.4.2, and 2.4.2-p1. It also affects Magento Open Source versions 2.3.0 to 2.3.7, 2.4.0 to 2.4.2, and 2.4.2-p1.
CVE-2021-36028 has a severity rating of 7.2, which is classified as critical.
An attacker with admin privileges can exploit CVE-2021-36028 by triggering a specially crafted script when saving a configurable product, leading to remote code execution.
You can find more information about CVE-2021-36028 at the following reference: [link](https://helpx.adobe.com/security/products/magento/apsb21-64.html)