GHSA-5m55-g8pv-x8ww

Suggest an improvement
Source
https://github.com/advisories/GHSA-5m55-g8pv-x8ww
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/08/GHSA-5m55-g8pv-x8ww/GHSA-5m55-g8pv-x8ww.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-5m55-g8pv-x8ww
Aliases
Published
2022-08-17T00:00:19Z
Modified
2024-01-11T19:41:40.687603Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N CVSS Calculator
Summary
Magento stored Cross-Site Scripting (XSS) vulnerability
Details

Adobe Commerce versions 2.4.3-p2 (and earlier), 2.3.7-p3 (and earlier) and 2.4.4 (and earlier) are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker with admin privileges to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.

Database specific
{
    "nvd_published_at": "2022-08-16T21:15:00Z",
    "cwe_ids": [
        "CWE-79"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2024-01-11T19:16:54Z"
}
References

Affected packages

Packagist / magento/community-edition

Package

Name
magento/community-edition
Purl
pkg:composer/magento/community-edition

Affected ranges

Type
ECOSYSTEM
Events
Introduced
2.3.0
Fixed
2.3.7-p4

Affected versions

2.*

2.3.0
2.3.1
2.3.2
2.3.2-p2
2.3.3
2.3.3-p1
2.3.4
2.3.4-p2
2.3.5
2.3.5-p1
2.3.5-p2
2.3.6
2.3.6-p1
2.3.7
2.3.7-p1
2.3.7-p2
2.3.7-p3

Packagist / magento/community-edition

Package

Name
magento/community-edition
Purl
pkg:composer/magento/community-edition

Affected ranges

Type
ECOSYSTEM
Events
Introduced
2.4.4
Fixed
2.4.5

Affected versions

2.*

2.4.4
2.4.4-p1
2.4.4-p2
2.4.4-p3
2.4.4-p4
2.4.4-p5
2.4.4-p6

Packagist / magento/community-edition

Package

Name
magento/community-edition
Purl
pkg:composer/magento/community-edition

Affected ranges

Type
ECOSYSTEM
Events
Introduced
2.4.0
Fixed
2.4.3-p3

Affected versions

2.*

2.4.0
2.4.0-p1
2.4.1
2.4.1-p1
2.4.2
2.4.2-p1
2.4.2-p2
2.4.3
2.4.3-p1
2.4.3-p2