First published: Sun Feb 13 2022(Updated: )
Adobe Commerce and Magento Open Source contain an improper input validation vulnerability which can allow for arbitrary code execution.
Credit: psirt@adobe.com psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Adobe Commerce and Magento Open Source | ||
composer/magento/community-edition | >=2.4.0<2.4.3-p2 | 2.4.3-p2 |
composer/magento/community-edition | >=2.3.3-p1<2.3.7-p3 | 2.3.7-p3 |
Adobe Commerce | <2.3.0 | |
Adobe Commerce | >2.3.3<=2.3.6 | |
Adobe Commerce | >=2.4.0<=2.4.2 | |
Adobe Commerce | =2.3.7-p1 | |
Adobe Commerce | =2.3.7-p2 | |
Adobe Commerce | =2.4.3 | |
Adobe Commerce | =2.4.3-p1 | |
Magento Magento | <2.3.0 | |
Magento Magento | >2.3.3<=2.3.6 | |
Magento Magento | >=2.4.0<=2.4.2 | |
Magento Magento | =2.3.7-p1 | |
Magento Magento | =2.3.7-p2 | |
Magento Magento | =2.4.3 | |
Magento Magento | =2.4.3-p1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID for this issue is CVE-2022-24086.
Adobe Commerce versions 2.4.3-p1 (and earlier) and 2.3.7-p2 (and earlier) are affected.
CVE-2022-24086 has a severity rating of 9.8 (Critical).
The vulnerability manifests as an improper input validation vulnerability during the checkout process.
Yes, exploitation of this issue does not require user interaction.
Exploitation of this vulnerability could result in arbitrary code execution.
To fix CVE-2022-24086, update to Adobe Commerce version 2.4.3-p2 (or later) or 2.3.7-p3 (or later).