CVE-2024-39408 – magento/community-edition
Package
Manager: composer
Name: magento/community-edition
Vulnerable Version: >=2.4.7-p1 <2.4.7-p2 || =2.4.7 || >=2.4.6-p1 <2.4.6-p7 || =2.4.6 || >=2.4.5-p1 <2.4.5-p9 || =2.4.5 || >=0 <2.4.4-p10 || =2.4.4
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00129 pctl0.33089
Details
Magento Open Source Cross-Site Request Forgery vulnerability Magento Open Source versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by a Cross-Site Request Forgery (CSRF) vulnerability that could allow an attacker to bypass security features and perform minor unauthorised actions on behalf of a user. The vulnerability could be exploited by tricking a victim into clicking a link or loading a page that submits a malicious request. Exploitation of this issue requires user interaction.
Metadata
Created: 2024-08-14T12:35:02Z
Modified: 2024-09-16T20:09:17Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/08/GHSA-4cj6-f32v-6hgx/GHSA-4cj6-f32v-6hgx.json
CWE IDs: ["CWE-352"]
Alternative ID: GHSA-4cj6-f32v-6hgx
Finding: F007
Auto approve: 1