Versions of the Algolia Search & Discovery extension for Magento 2 prior to 3.17.2 and 3.16.2 contain a vulnerability where data read from the database was treated as a trusted source during job execution.
If an attacker is able to modify records used by the extension’s indexing queue, this could result in arbitrary PHP code execution when the affected job is processed.
Exploitation requires the ability to write malicious data to the Magento database and for the indexing queue to be enabled.
This vulnerability has been fixed in the following versions:
Merchants should upgrade to a supported patched version immediately.
Versions outside the supported maintenance window do not receive security updates and remain vulnerable.
Upgrading to a patched version is the only recommended remediation.
If an immediate upgrade is not possible, the following temporary risk mitigations may reduce exposure:
algoliasearch_queue table for unexpected or unrecognized entries.algoliasearch_queue_archive.These mitigations are provided as guidance only and do not replace upgrading to a patched version.
{
"cwe_ids": [
"CWE-74"
],
"severity": "MODERATE",
"github_reviewed_at": "2026-01-14T21:46:11Z",
"nvd_published_at": null,
"github_reviewed": true
}