CVE-2025-64174
BaseFortify
Publication date: 2025-11-06
Last updated on: 2026-02-04
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| openmage | magento | to 20.16.0 (inc) |
| openmage | magento_lts | 20.15.0 |
| openmage | magento_lts | 20.16.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a stored Cross-Site Scripting (XSS) issue in Magento-lts versions 20.15.0 and below. It allows an admin with direct database access or access to the admin notification feed source to inject malicious scripts into vulnerable fields. The problem arises because unescaped translation strings and URLs are printed in certain parts of the admin interface, which can lead to script injection if the data is maliciously crafted. This vulnerability is fixed in version 20.16.0.
How can this vulnerability impact me? :
This vulnerability can allow an attacker with admin database access or control over the admin notification feed to inject malicious scripts into the Magento-lts admin interface. This could lead to unauthorized actions being performed in the admin panel, potential theft of sensitive information, or further compromise of the system through script execution in the context of the admin user.
What immediate steps should I take to mitigate this vulnerability?
Upgrade Magento-lts to version 20.16.0 or later, as this version contains the fix for the stored Cross-Site Scripting (XSS) vulnerability. Additionally, restrict admin access to trusted users only and avoid using untrusted data in admin notification feeds or translation strings until the upgrade is applied.