{"uuid": "a6c66542-6f24-4370-bb1f-016c8c560407", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27400", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/5917", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27400\n\ud83d\udd25 CVSS Score: 2.9 (cvssV3_1, Vector: CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:L)\n\ud83d\udd39 Description: Magento Long Term Support (LTS) is an unofficial, community-driven project provides an alternative to the Magento Community Edition e-commerce platform with a high level of backward compatibility. Versions prior to 20.12.3 and 20.13.1 contain a vulnerability that allows script execution in the admin panel which could lead to cross-site scripting against authenticated admin users. The attack requires an admin user with configuration access, so in practicality it is not very likely to be useful given that a user with this level of access is probably already a full admin. Versions 20.12.3 and 20.13.1 contain a patch for the issue.\n\ud83d\udccf Published: 2025-02-28T15:26:14.265Z\n\ud83d\udccf Modified: 2025-02-28T15:43:37.220Z\n\ud83d\udd17 References:\n1. https://github.com/OpenMage/magento-lts/security/advisories/GHSA-5pxh-89cx-4668\n2. https://github.com/OpenMage/magento-lts/commit/d307e5bf75729a2347dde0952fe9fd9fcd9c6aea\n3. https://github.com/OpenMage/magento-lts/releases/tag/v20.12.3\n4. https://github.com/OpenMage/magento-lts/releases/tag/v20.13.0", "creation_timestamp": "2025-02-28T16:27:02.000000Z"}