First published: Tue Sep 12 2023(Updated: )
Adobe Commerce versions 2.4.3-p1 (and earlier) and 2.3.7-p2 (and earlier) are affected by an improper input validation vulnerability. Exploitation of this issue does not require user interaction and could result in a post-authentication arbitrary code execution.
Credit: psirt@adobe.com psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Adobe Magento Open Source | <2.3.7 | |
Adobe Magento Open Source | >=2.4.0<2.4.3 | |
Adobe Magento Open Source | =2.3.7-p1 | |
Adobe Magento Open Source | =2.3.7-p2 | |
Adobe Magento Open Source | =2.4.3 | |
Adobe Magento Open Source | =2.4.3-p1 | |
Adobe Commerce | <2.3.7 | |
Adobe Commerce | >=2.4.0<2.4.3 | |
Adobe Commerce | =2.3.7-p1 | |
Adobe Commerce | =2.3.7-p2 | |
Adobe Commerce | =2.4.3 | |
Adobe Commerce | =2.4.3-p1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Adobe Commerce vulnerability is CVE-2022-24093.
Adobe Commerce versions 2.4.3-p1 (and earlier) and 2.3.7-p2 (and earlier) are affected by this vulnerability.
CVE-2022-24093 has a severity rating of 7.2 (critical).
The vulnerability in Adobe Commerce allows for an improper input validation vulnerability, which could result in a post-authentication arbitrary code execution.
No, exploitation of this vulnerability does not require user interaction.
To fix this vulnerability in Adobe Commerce, update to versions 2.4.3-p2, 2.3.8-p1, or later.
You can find more information about this Adobe Commerce vulnerability on Adobe's website.