CVE-2021-36022

9.1 CRITICAL

📋 TL;DR

This CVE describes an XML injection vulnerability in Magento Commerce that allows authenticated attackers with admin privileges to execute arbitrary code remotely. The vulnerability affects Magento Commerce versions 2.4.2 and earlier, 2.4.2-p1 and earlier, and 2.3.7 and earlier. Attackers can exploit this through the Widgets Update Layout feature to achieve remote code execution.

💻 Affected Systems

Products:
  • Magento Commerce
  • Magento Open Source
Versions: 2.4.2 and earlier, 2.4.2-p1 and earlier, 2.3.7 and earlier
Operating Systems: All platforms running affected Magento versions
Default Config Vulnerable: ⚠️ Yes
Notes: Requires admin privileges to exploit. Magento Commerce Cloud may have additional protections.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the Magento instance leading to data theft, defacement, malware injection, and lateral movement to other systems.

🟠

Likely Case

Unauthorized remote code execution allowing attackers to steal customer data, payment information, and administrative credentials.

🟢

If Mitigated

Limited impact if proper access controls and input validation are implemented, though the vulnerability still exists.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires admin access. Multiple proof-of-concept examples exist in security communities.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.4.3, 2.4.2-p2, 2.3.7-p1

Vendor Advisory: https://helpx.adobe.com/security/products/magento/apsb21-64.html

Restart Required: Yes

Instructions:

1. Backup your Magento instance and database. 2. Update to Magento Commerce 2.4.3 or later. 3. Apply security patches for older versions: 2.4.2-p2 or 2.3.7-p1. 4. Clear cache and reindex. 5. Verify the update was successful.

🔧 Temporary Workarounds

Restrict Admin Access

all

Limit admin panel access to trusted IP addresses only

Configure .htaccess or web server rules to restrict /admin access

Disable Unused Widgets

all

Disable or remove unused widget functionality

Navigate to Content > Widgets in admin panel and disable unnecessary widgets

🧯 If You Can't Patch

  • Implement strict access controls for admin accounts with multi-factor authentication
  • Monitor admin activity logs for suspicious widget or layout modifications

🔍 How to Verify

Check if Vulnerable:

Check Magento version via admin panel or by examining app/etc/env.php file

Check Version:

php bin/magento --version

Verify Fix Applied:

Verify version is 2.4.3 or later, or that security patches 2.4.2-p2/2.3.7-p1 are applied

📡 Detection & Monitoring

Log Indicators:

  • Unusual admin login patterns
  • Suspicious widget or layout XML modifications
  • Unexpected PHP process execution

Network Indicators:

  • Unusual outbound connections from Magento server
  • Traffic to known exploit frameworks

SIEM Query:

source="magento" AND (event="admin_login" OR event="widget_update") AND user="*" | stats count by src_ip, user

🔗 References

📤 Share & Export