Adobe Commerce versions 2.4.3-p1 (and earlier) and 2.3.7-p2 (and earlier) are affected by an improper input validation vulnerability during the checkout process. Exploitation of this issue does not require user interaction and could result in arbitrary code execution.
Published 2022-02-16 17:15:13
Updated 2022-02-22 17:40:45
View at NVD,   CVE.org
Vulnerability category: Input validation

CVE-2022-24086 is in the CISA Known Exploited Vulnerabilities Catalog

CISA vulnerability name:
Adobe Commerce and Magento Open Source Improper Input Validation Vulnerability
CISA required action:
Apply updates per vendor instructions.
CISA description:
Adobe Commerce and Magento Open Source contain an improper input validation vulnerability which can allow for arbitrary code execution.
Added on 2022-02-15 Action due date 2022-03-01

Exploit prediction scoring system (EPSS) score for CVE-2022-24086

Probability of exploitation activity in the next 30 days: 22.60%

Percentile, the proportion of vulnerabilities that are scored at or less: ~ 96 % EPSS Score History EPSS FAQ

CVSS scores for CVE-2022-24086

Base Score Base Severity CVSS Vector Exploitability Score Impact Score Score Source
10.0
HIGH AV:N/AC:L/Au:N/C:C/I:C/A:C
10.0
10.0
NIST
9.8
CRITICAL CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
3.9
5.9
Adobe Systems Incorporated

CWE ids for CVE-2022-24086

  • The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
    Assigned by: psirt@adobe.com (Primary)

References for CVE-2022-24086

Products affected by CVE-2022-24086

This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!