CVE-2023-26366 – magento/project-community-edition
Package
Manager: composer
Name: magento/project-community-edition
Vulnerable Version: >=0 <=2.0.2
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N/E:U
EPSS: 0.00324 pctl0.54805
Details
Magento Open Source allows Server-Side Request Forgery (SSRF) Adobe Commerce versions 2.4.7-beta1 (and earlier), 2.4.6-p2 (and earlier), 2.4.5-p4 (and earlier) and 2.4.4-p5 (and earlier) are affected by a Server-Side Request Forgery (SSRF) vulnerability that could lead to arbitrary file system read. A high-privileged authenticated attacker can force the application to make arbitrary requests via injection of arbitrary URLs. Exploitation of this issue does not require user interaction, scope is changed due to the fact that an attacker can enforce file read outside the application's path boundary.
Metadata
Created: 2023-10-13T09:30:22Z
Modified: 2025-03-04T18:20:03Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/10/GHSA-8jxc-5f94-22vh/GHSA-8jxc-5f94-22vh.json
CWE IDs: ["CWE-918"]
Alternative ID: GHSA-8jxc-5f94-22vh
Finding: F100
Auto approve: 1