CVE-2021-36023

9.1 CRITICAL

📋 TL;DR

This CVE describes an XML injection vulnerability in Magento Commerce that allows authenticated administrators to execute arbitrary code remotely. Attackers with admin privileges can exploit this through specially crafted scripts in the Widgets Update Layout feature. This affects Magento Commerce versions 2.4.2 and earlier, 2.4.2-p1 and earlier, and 2.3.7 and earlier.

💻 Affected Systems

Products:
  • Magento Commerce
  • Adobe Commerce
Versions: 2.4.2 and earlier, 2.4.2-p1 and earlier, 2.3.7 and earlier
Operating Systems: All platforms running affected Magento versions
Default Config Vulnerable: ⚠️ Yes
Notes: Requires admin privileges to exploit; affects both on-premise and cloud deployments

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full server compromise leading to data theft, malware deployment, and complete system control

🟠

Likely Case

Unauthorized code execution allowing data exfiltration, backdoor installation, and privilege escalation

🟢

If Mitigated

Limited impact if proper access controls and input validation are implemented

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires admin access; XML injection leads to remote code execution

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.4.3, 2.4.2-p2, 2.3.7-p1

Vendor Advisory: https://helpx.adobe.com/security/products/magento/apsb21-64.html

Restart Required: Yes

Instructions:

1. Backup your Magento installation and database. 2. Update to patched versions via Composer: composer require magento/product-community-edition=2.4.3. 3. Run setup upgrade: php bin/magento setup:upgrade. 4. Clear cache: php bin/magento cache:clean. 5. Deploy static content: php bin/magento setup:static-content:deploy.

🔧 Temporary Workarounds

Restrict Admin Access

all

Limit admin panel access to trusted users only and implement strong authentication

Input Validation

all

Implement additional XML input validation in custom modules

🧯 If You Can't Patch

  • Implement strict access controls and monitor admin user activities
  • Deploy web application firewall with XML injection protection rules

🔍 How to Verify

Check if Vulnerable:

Check Magento version via admin panel or run: php bin/magento --version

Check Version:

php bin/magento --version

Verify Fix Applied:

Verify version is 2.4.3, 2.4.2-p2, or 2.3.7-p1 or later

📡 Detection & Monitoring

Log Indicators:

  • Unusual admin activity patterns
  • XML parsing errors in application logs
  • Suspicious widget/layout update requests

Network Indicators:

  • Unexpected outbound connections from Magento server
  • Unusual payloads in POST requests to admin endpoints

SIEM Query:

source="magento.log" AND ("widget" OR "layout") AND ("xml" OR "injection")

🔗 References

📤 Share & Export