Published: 11/02/2021 Updated: 16/02/2021
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.1 | Impact Score: 5.2 | Exploitability Score: 2.8
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

Magento versions 2.4.1 (and previous versions), 2.4.0-p1 (and previous versions) and 2.3.6 (and previous versions) are vulnerable to a stored cross-site scripting (XSS) in the customer address upload feature. Successful exploitation could lead to arbitrary JavaScript execution in the victim's browser. Exploitation of this issue requires user interaction.

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

magento magento

magento magento 2.3.6

magento magento 2.4.0

magento magento 2.4.1

Vendor Advisories

<!-- version component --> Security Updates Available for Magento | APSB21-08 Bulletin ID Date Published Priority ASPB21-08 February 09, 2021       2 ...

Recent Articles

Attackers Exploit Critical Adobe Flaw to Target Windows Users
Threatpost • Lindsey O'Donnell • 09 Feb 2021

Adobe is warning of a critical vulnerability that has been exploited in the wild to target Adobe Reader users on Windows.
The vulnerability (CVE-2021-21017) has been exploited in “limited attacks,” according to Adobe’s Tuesday advisory, part of its regularly scheduled February updates. The flaw in question is a critical-severity heap-based buffer overflow flaw.
This type of buffer-overflow error occurs when the region of a process’ memory used to store dynamic variables (the ...