Loading HuntDB...

GHSA-8p5c-f836-m4h7

GitHub Security Advisory

Magento 2 Community Edition XML Injection

✓ GitHub Reviewed CRITICAL Has CVE

Advisory Details

An XPath entity injection vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. An attacker can craft a GET request to page cache block rendering module that gets passed to XML data processing engine without validation. The crafted key/value GET request data allows an attacker to limited access to underlying XML data.

As per [the Magento Release 2.3.3](https://web.archive.org/web/20201126132230/https://devdocs.magento.com/guides/v2.3/release-notes/release-notes-2-3-3-commerce.html#new-security-only-patch-available), if you have already implemented the pre-release version of this patch (2.3.2-p1), it is highly recommended to promptly upgrade to 2.3.2-p2.

Affected Packages

Packagist magento/community-edition
Affected versions: 2.2.0 (fixed in 2.2.10)
Packagist magento/community-edition
Affected versions: 2.3.0 (fixed in 2.3.2-p2)

Related CVEs

Key Information

GHSA ID
GHSA-8p5c-f836-m4h7
Published
May 24, 2022 5:00 PM
Last Modified
February 12, 2024 11:54 AM
CVSS Score
9.0 /10
Primary Ecosystem
Packagist
Primary Package
magento/community-edition
GitHub Reviewed
✓ Yes

Dataset

Last updated: July 1, 2025 6:26 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.