Adobe Commerce versions 2.4.6-p4, 2.4.5-p6, 2.4.4-p7, 2.4.7-beta3 and earlier are affected by an Improper Input Validation vulnerability that could result in arbitrary code execution on the underlying filesystem. Exploitation of this issue does not require user interaction, but the attack complexity is high.
                
            Metrics
Affected Vendors & Products
References
        History
                    Tue, 15 Apr 2025 16:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | 
Tue, 15 Apr 2025 16:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | Adobe Commerce versions 2.4.6-p4, 2.4.5-p6, 2.4.4-p7, 2.4.7-beta3 and earlier are affected by an Improper Input Validation vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue does not require user interaction, but the attack complexity is high. | Adobe Commerce versions 2.4.6-p4, 2.4.5-p6, 2.4.4-p7, 2.4.7-beta3 and earlier are affected by an Improper Input Validation vulnerability that could result in arbitrary code execution on the underlying filesystem. Exploitation of this issue does not require user interaction, but the attack complexity is high. | 
| Title | [Adobe Cloud] RCE through frontend gift registry sharing | Adobe Commerce | Improper Input Validation (CWE-20) | 
Tue, 11 Feb 2025 16:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Adobe Adobe commerce Adobe magento | |
| Weaknesses | NVD-CWE-noinfo | |
| CPEs | cpe:2.3:a:adobe:commerce:-:*:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.3.7:-:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.3.7:p1:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.3.7:p2:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.3.7:p3:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.3.7:p4-ext1:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.3.7:p4-ext2:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.3.7:p4-ext3:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.3.7:p4-ext4:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.3.7:p4:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.0:-:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.0:ext-1:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.0:ext-2:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.0:ext-3:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.0:ext-4:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.1:-:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.1:ext-1:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.1:ext-2:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.1:ext-3:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.1:ext-4:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.2:-:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.2:ext-1:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.2:ext-2:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.2:ext-3:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.2:ext-4:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.2:ext-6:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.2:p1:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.2:p2:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.3:-:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.3:ext-1:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.3:ext-2:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.3:ext-3:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.3:ext-4:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.3:ext-6:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.3:p1:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.3:p2:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.4:-:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.4:p1:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.4:p2:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.4:p3:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.4:p4:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.4:p5:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.4:p6:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.4:p7:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.5:-:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.5:p1:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.5:p2:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.5:p3:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.5:p4:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.5:p5:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.5:p6:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.6:-:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.6:p1:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.6:p2:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.6:p3:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.6:p4:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.7:-:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.7:b1:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.7:b2:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.7:beta3:*:*:*:*:*:* cpe:2.3:a:adobe:magento:2.4.4:-:*:*:open_source:*:*:* cpe:2.3:a:adobe:magento:2.4.4:p1:*:*:open_source:*:*:* cpe:2.3:a:adobe:magento:2.4.4:p2:*:*:open_source:*:*:* cpe:2.3:a:adobe:magento:2.4.4:p3:*:*:open_source:*:*:* cpe:2.3:a:adobe:magento:2.4.4:p4:*:*:open_source:*:*:* cpe:2.3:a:adobe:magento:2.4.4:p5:*:*:open_source:*:*:* cpe:2.3:a:adobe:magento:2.4.4:p6:*:*:open_source:*:*:* cpe:2.3:a:adobe:magento:2.4.4:p7:*:*:open_source:*:*:* cpe:2.3:a:adobe:magento:2.4.5:-:*:*:open_source:*:*:* cpe:2.3:a:adobe:magento:2.4.5:p1:*:*:open_source:*:*:* cpe:2.3:a:adobe:magento:2.4.5:p2:*:*:open_source:*:*:* cpe:2.3:a:adobe:magento:2.4.5:p3:*:*:open_source:*:*:* cpe:2.3:a:adobe:magento:2.4.5:p4:*:*:open_source:*:*:* cpe:2.3:a:adobe:magento:2.4.5:p5:*:*:open_source:*:*:* cpe:2.3:a:adobe:magento:2.4.5:p6:*:*:open_source:*:*:* cpe:2.3:a:adobe:magento:2.4.6:-:*:*:open_source:*:*:* cpe:2.3:a:adobe:magento:2.4.6:p1:*:*:open_source:*:*:* cpe:2.3:a:adobe:magento:2.4.6:p2:*:*:open_source:*:*:* cpe:2.3:a:adobe:magento:2.4.6:p3:*:*:open_source:*:*:* cpe:2.3:a:adobe:magento:2.4.6:p4:*:*:open_source:*:*:* cpe:2.3:a:adobe:magento:2.4.7:-:*:*:open_source:*:*:* cpe:2.3:a:adobe:magento:2.4.7:b1:*:*:open_source:*:*:* cpe:2.3:a:adobe:magento:2.4.7:b2:*:*:open_source:*:*:* cpe:2.3:a:adobe:magento:2.4.7:beta3:*:*:open_source:*:*:* | |
| Vendors & Products | Adobe Adobe commerce Adobe magento | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: adobe
Published: 2024-04-10T11:49:04.024Z
Updated: 2025-04-15T15:45:02.245Z
Reserved: 2023-12-04T16:52:22.978Z
Link: CVE-2024-20758
 Vulnrichment
                        Vulnrichment
                    Updated: 2024-08-01T21:59:42.892Z
 NVD
                        NVD
                    Status : Analyzed
Published: 2024-04-10T12:15:08.567
Modified: 2025-04-16T14:53:40.187
Link: CVE-2024-20758
 Redhat
                        Redhat
                    No data.