Adobe Commerce/Magento Open Source Multiple Vulnerabilities (APSB24-73)

high Nessus Plugin ID 242631

Synopsis

The Adobe Commerce/Magento Open Source instance installed on the remote host is affected by multiple vulnerabilities.

Description

The version of Adobe Commerce/Magento Open Source installed on the remote host falls within one of the following ranges 2.4.7.0 < 2.4.7-p3 (Adobe Commerce) / 2.4.6.0 < 2.4.6-p8 (Adobe Commerce) / 2.4.5.0 < 2.4.5-p10 (Adobe Commerce) / 0.x < 2.4.4-p11 (Adobe Commerce) / 2.4.7.0 < 2.4.7-p3 (Magento Open Source) / 2.4.6.0 < 2.4.6-p8 (Magento Open Source) / 2.4.5.0 < 2.4.5-p10 (Magento Open Source) / 0.x < 2.4.4-p11 (Magento Open Source)

It is, therefore, affected by multiple vulnerabilities as referenced in the APSB24-73 advisory.

- Adobe Commerce versions 2.4.7-p2, 2.4.6-p7, 2.4.5-p9, 2.4.4-p10 and earlier are affected by a Cross-Site Scripting (XSS) vulnerability that could be exploited to execute arbitrary code. If an admin attacker can trick a user into clicking a specially crafted link or submitting a form, malicious scripts may be executed within the context of the victim's browser and have high impact on confidentiality and integrity. Exploitation of this issue requires user interaction. (CVE-2024-45116)

- Adobe Commerce versions 2.4.7-p2, 2.4.6-p7, 2.4.5-p9, 2.4.4-p10 and earlier are affected by an Improper Authentication vulnerability that could result in a security feature bypass. A low-privileged attacker could leverage this vulnerability to gain unauthorized access without proper credentials. Exploitation of this issue does not require user interaction. (CVE-2024-45148)

- Adobe Commerce versions 2.4.7-P2, 2.4.6-P7, 2.4.5-P9, 2.4.4-P10 and earlier are affected by a Cross-Site Scripting (XSS) vulnerability that could be exploited to execute arbitrary code. If an admin attacker can trick a user into clicking a specially crafted link or submitting a form, malicious scripts may be executed within the context of the victim's browser and have high impact on confidentiality and integrity. Exploitation of this issue requires user interaction. (CVE-2024-45116)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade to Adobe Commerce/Magento Open Source version as advised

See Also

http://www.nessus.org/u?43c587de

Plugin Details

Severity: High

ID: 242631

File Name: adobe_commerce_apsb24-73.nasl

Version: 1.1

Type: local

Agent: unix

Family: Misc.

Published: 7/23/2025

Updated: 7/23/2025

Configuration: Enable thorough checks (optional)

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.3

CVSS v2

Risk Factor: High

Base Score: 8.5

Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:N

CVSS Score Source: CVE-2024-45116

CVSS v3

Risk Factor: High

Base Score: 8.1

Vector: CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:N

Vulnerability Information

CPE: cpe:/a:adobe:magento, cpe:/a:adobe:commerce

Patch Publication Date: 4/9/2024

Vulnerability Publication Date: 4/9/2024

Reference Information

CVE: CVE-2024-45116, CVE-2024-45117, CVE-2024-45119, CVE-2024-45120, CVE-2024-45121, CVE-2024-45122, CVE-2024-45123, CVE-2024-45124, CVE-2024-45125, CVE-2024-45127, CVE-2024-45128, CVE-2024-45129, CVE-2024-45130, CVE-2024-45131, CVE-2024-45132, CVE-2024-45133, CVE-2024-45134, CVE-2024-45135, CVE-2024-45149