First published: Mon Mar 27 2023(Updated: )
Adobe Commerce versions 2.4.4-p2 (and earlier) and 2.4.5-p1 (and earlier) are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to impact the availability of a user's minor feature. Exploitation of this issue does not require user interaction.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Adobe Commerce | <2.4.4 | |
Adobe Commerce | =2.4.4 | |
Adobe Commerce | =2.4.4-p1 | |
Adobe Commerce | =2.4.4-p2 | |
Adobe Commerce | =2.4.5 | |
Adobe Commerce | =2.4.5-p1 | |
Adobe Magento Open Source | <2.4.4 | |
Adobe Magento Open Source | =2.4.4 | |
Adobe Magento Open Source | =2.4.4-p1 | |
Adobe Magento Open Source | =2.4.4-p2 | |
Adobe Magento Open Source | =2.4.5 | |
Adobe Magento Open Source | =2.4.5-p1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-22250.
Adobe Commerce versions 2.4.4-p2 (and earlier) and 2.4.5-p1 (and earlier) are affected.
The severity of CVE-2023-22250 is medium with a CVSS score of 5.3.
The vulnerability could result in a security feature bypass and impact the availability of a user's minor feature.
You can find more information about CVE-2023-22250 on the Adobe security advisory page: https://helpx.adobe.com/security/products/magento/apsb23-17.html