CVE-2024-20719

9.1 CRITICAL

📋 TL;DR

This stored Cross-Site Scripting (XSS) vulnerability in Adobe Commerce allows an authenticated admin attacker to inject malicious JavaScript into admin pages. When other admin users view these pages, the scripts execute in their browsers, potentially enabling session hijacking or privilege escalation. The vulnerability affects Adobe Commerce versions 2.4.6-p3, 2.4.5-p5, 2.4.4-p6 and earlier.

💻 Affected Systems

Products:
  • Adobe Commerce
  • Magento Open Source
Versions: 2.4.6-p3 and earlier, 2.4.5-p5 and earlier, 2.4.4-p6 and earlier
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires admin-level access to exploit. All deployments using affected versions are vulnerable by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with admin access could inject malicious scripts that steal session cookies or credentials from other admin users, leading to complete compromise of the Adobe Commerce instance and potentially customer data exposure.

🟠

Likely Case

Malicious admin user or compromised admin account could execute JavaScript in other admin users' browsers to perform actions as those users, potentially modifying store settings, accessing sensitive data, or installing backdoors.

🟢

If Mitigated

With proper access controls, strong admin authentication, and Content Security Policy headers, the impact is limited to the specific admin user's session being compromised rather than full system takeover.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires admin credentials but is technically simple once authenticated. The vulnerability is stored XSS, making it persistent and affecting all admin users who view the compromised pages.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to Adobe Commerce 2.4.6-p4, 2.4.5-p6, 2.4.4-p7 or later

Vendor Advisory: https://helpx.adobe.com/security/products/magento/apsb24-03.html

Restart Required: No

Instructions:

1. Backup your Adobe Commerce instance and database. 2. Apply the security patch via Composer: composer require magento/product-community-edition=2.4.6-p4 (adjust version as needed). 3. Run setup upgrade: bin/magento setup:upgrade. 4. Clear cache: bin/magento cache:clean.

🔧 Temporary Workarounds

Implement Content Security Policy

all

Add Content Security Policy headers to restrict script execution sources

Add to .htaccess or web server config: Header set Content-Security-Policy "script-src 'self' 'unsafe-inline' 'unsafe-eval'; object-src 'none'"

Restrict Admin Access

all

Limit admin access to trusted IP addresses only

Add to .htaccess in admin directory: Require ip 192.168.1.0/24 (adjust for your network)

🧯 If You Can't Patch

  • Implement strict admin access controls and multi-factor authentication
  • Monitor admin user activity logs for suspicious behavior

🔍 How to Verify

Check if Vulnerable:

Check Adobe Commerce version via admin panel or run: php bin/magento --version

Check Version:

php bin/magento --version

Verify Fix Applied:

Verify version is 2.4.6-p4, 2.4.5-p6, 2.4.4-p7 or later using: php bin/magento --version

📡 Detection & Monitoring

Log Indicators:

  • Unusual admin user activity patterns
  • Multiple failed login attempts to admin panel
  • Admin session anomalies

Network Indicators:

  • Unexpected JavaScript payloads in admin requests
  • Suspicious outbound connections from admin sessions

SIEM Query:

source="*commerce*" AND ("admin" OR "magento_admin") AND (javascript OR script OR eval OR document.cookie)

🔗 References

📤 Share & Export