Security Bypass Affecting magento/community-edition package, versions >=2.2, <2.2.10 >=2.3, <2.3.2-p2
Threat Intelligence
EPSS
0.14% (51st
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-PHP-MAGENTOCOMMUNITYEDITION-473119
- published 15 Oct 2019
- disclosed 8 Oct 2019
- credit Mohammad Saad
Introduced: 8 Oct 2019
CVE-2019-8112 Open this link in a new tabHow to fix?
Upgrade magento/community-edition
to version 2.2.10, 2.3.2-p2 or higher.
Overview
magento/community-edition is a modern cloud eCommerce platform.
Affected versions of this package are vulnerable to Security Bypass. An unauthenticated user can bypass the email confirmation mechanism via GET request that captures relevant account data obtained from the POST response related to new user creation.
References
CVSS Scores
version 3.1