CVE-2019-8158
moderate-risk
Published 2019-11-06
An XPath entity injection vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. An attacker can craft a GET request to page cache block rendering module that gets passed to XML data processing engine without validation. The crafted key/value GET request data allows an attacker to limited access to underlying XML data.
Do I need to act?
-
0.16% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
+
Fix available
Upgrade to: fe462f46d5efe781681fa25067a180b19e0e35de, fe462f46d5efe781681fa25067a180b19e0e35de, 452b21aa6d3a221b587ca32d2d50785d92dd6aa1, 452b21aa6d3a221b587ca32d2d50785d92dd6aa1
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Vendors
References (2)
43
/ 100
moderate-risk
Severity
32/34 · Critical
Exploitability
1/34 · Minimal
Exposure
10/34 · Low