First published: Wed Sep 01 2021(Updated: )
Magento Commerce versions 2.4.2 (and earlier), 2.4.2-p1 (and earlier) and 2.3.7 (and earlier) are affected by a Path Traversal vulnerability via the `theme[preview_image]` parameter. An attacker with admin privileges could leverage this vulnerability to achieve remote code execution.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Adobe Adobe Commerce | >=2.3.0<=2.3.7 | |
Adobe Adobe Commerce | >=2.4.0<=2.4.2 | |
Adobe Adobe Commerce | =2.4.2-p1 | |
Adobe Magento Open Source | >=2.3.0<=2.3.7 | |
Adobe Magento Open Source | >=2.4.0<=2.4.2 | |
Adobe Magento Open Source | =2.4.2-p1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-36031.
Magento Commerce versions 2.4.2 (and earlier), 2.4.2-p1 (and earlier), and 2.3.7 (and earlier) are affected.
The severity of CVE-2021-36031 is high with a severity value of 7.2.
An attacker with admin privileges could leverage this vulnerability to achieve remote code execution.
Yes, Magento has released patches to address this vulnerability. It is recommended to update to the latest patched version of Magento Commerce.