Skip to content

Commit 1eb715b

Browse files
1 parent a181d22 commit 1eb715b

File tree

3 files changed

+104
-4
lines changed

3 files changed

+104
-4
lines changed
Lines changed: 88 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,88 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-595p-g7xc-c333",
4+
"modified": "2026-01-14T21:46:11Z",
5+
"published": "2026-01-14T21:46:11Z",
6+
"aliases": [],
7+
"summary": "Algolia Search & Discovery for Magento 2 Has Untrusted Data Handling",
8+
"details": "### Impact\n\nVersions of the Algolia Search & Discovery extension for Magento 2 prior to **3.17.2** and **3.16.2** contain a vulnerability where data read from the database was treated as a trusted source during job execution.\n\nIf an attacker is able to modify records used by the extension’s indexing queue, this could result in **arbitrary PHP code execution** when the affected job is processed.\n\nExploitation requires the ability to write malicious data to the Magento database and for the indexing queue to be enabled.\n\n---\n\n### Patches\n\nThis vulnerability has been fixed in the following versions:\n\n- **3.17.2**\n- **3.16.2**\n\nMerchants should upgrade to a supported patched version immediately.\n\nVersions outside the supported maintenance window do **not** receive security updates and remain vulnerable.\n\n---\n\n### Workarounds\n\nUpgrading to a patched version is the only recommended remediation.\n\nIf an immediate upgrade is not possible, the following temporary risk mitigations may reduce exposure:\n\n- Disable the Algolia indexing queue to prevent queued jobs from being executed.\n- Restrict job execution logic to an explicit allowlist of permitted operations.\n- Review the contents of the `algoliasearch_queue` table for unexpected or unrecognized entries.\n- If queue archiving is enabled, review historical records in `algoliasearch_queue_archive`.\n\nThese mitigations are provided as guidance only and do not replace upgrading to a patched version.\n\n---\n\n### References\n\n- Algolia Search & Discovery for Magento 2 releases:\n - [3.16.2](https://github.com/algolia/algoliasearch-magento-2/releases/tag/3.16.2)\n - [3.17.2](https://github.com/algolia/algoliasearch-magento-2/releases/tag/3.17.2)",
9+
"severity": [
10+
{
11+
"type": "CVSS_V4",
12+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N"
13+
}
14+
],
15+
"affected": [
16+
{
17+
"package": {
18+
"ecosystem": "Packagist",
19+
"name": "algolia/algoliasearch-magento-2"
20+
},
21+
"ranges": [
22+
{
23+
"type": "ECOSYSTEM",
24+
"events": [
25+
{
26+
"introduced": "3.17.0-beta.1"
27+
},
28+
{
29+
"fixed": "3.17.2"
30+
}
31+
]
32+
}
33+
],
34+
"database_specific": {
35+
"last_known_affected_version_range": "<= 3.17.1"
36+
}
37+
},
38+
{
39+
"package": {
40+
"ecosystem": "Packagist",
41+
"name": "algolia/algoliasearch-magento-2"
42+
},
43+
"ranges": [
44+
{
45+
"type": "ECOSYSTEM",
46+
"events": [
47+
{
48+
"introduced": "0"
49+
},
50+
{
51+
"fixed": "3.16.2"
52+
}
53+
]
54+
}
55+
],
56+
"database_specific": {
57+
"last_known_affected_version_range": "<= 3.16.1"
58+
}
59+
}
60+
],
61+
"references": [
62+
{
63+
"type": "WEB",
64+
"url": "https://github.com/algolia/algoliasearch-magento-2/security/advisories/GHSA-595p-g7xc-c333"
65+
},
66+
{
67+
"type": "PACKAGE",
68+
"url": "https://github.com/algolia/algoliasearch-magento-2"
69+
},
70+
{
71+
"type": "WEB",
72+
"url": "https://github.com/algolia/algoliasearch-magento-2/releases/tag/3.16.2"
73+
},
74+
{
75+
"type": "WEB",
76+
"url": "https://github.com/algolia/algoliasearch-magento-2/releases/tag/3.17.2"
77+
}
78+
],
79+
"database_specific": {
80+
"cwe_ids": [
81+
"CWE-74"
82+
],
83+
"severity": "MODERATE",
84+
"github_reviewed": true,
85+
"github_reviewed_at": "2026-01-14T21:46:11Z",
86+
"nvd_published_at": null
87+
}
88+
}

advisories/github-reviewed/2026/01/GHSA-7cw6-7h3h-v8pf/GHSA-7cw6-7h3h-v8pf.json

Lines changed: 10 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-7cw6-7h3h-v8pf",
4-
"modified": "2026-01-14T16:54:27Z",
4+
"modified": "2026-01-14T21:46:46Z",
55
"published": "2026-01-14T16:54:27Z",
66
"aliases": [
77
"CVE-2026-23498"
@@ -59,6 +59,14 @@
5959
"type": "WEB",
6060
"url": "https://github.com/shopware/shopware/security/advisories/GHSA-7cw6-7h3h-v8pf"
6161
},
62+
{
63+
"type": "ADVISORY",
64+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-23498"
65+
},
66+
{
67+
"type": "WEB",
68+
"url": "https://github.com/shopware/shopware/commit/3966b05590e29432b8485ba47b4fcd14dd0b8475"
69+
},
6270
{
6371
"type": "ADVISORY",
6472
"url": "https://github.com/advisories/GHSA-7v2v-9rm4-7m8f"
@@ -75,6 +83,6 @@
7583
"severity": "HIGH",
7684
"github_reviewed": true,
7785
"github_reviewed_at": "2026-01-14T16:54:27Z",
78-
"nvd_published_at": null
86+
"nvd_published_at": "2026-01-14T19:16:48Z"
7987
}
8088
}

advisories/github-reviewed/2026/01/GHSA-g9mf-h72j-4rw9/GHSA-g9mf-h72j-4rw9.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-g9mf-h72j-4rw9",
4-
"modified": "2026-01-14T21:06:08Z",
4+
"modified": "2026-01-14T21:46:26Z",
55
"published": "2026-01-14T21:06:08Z",
66
"aliases": [
77
"CVE-2026-22036"
@@ -59,6 +59,10 @@
5959
"type": "WEB",
6060
"url": "https://github.com/nodejs/undici/security/advisories/GHSA-g9mf-h72j-4rw9"
6161
},
62+
{
63+
"type": "ADVISORY",
64+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-22036"
65+
},
6266
{
6367
"type": "WEB",
6468
"url": "https://github.com/nodejs/undici/commit/b04e3cbb569c1596f86c108e9b52c79d8475dcb3"
@@ -75,6 +79,6 @@
7579
"severity": "LOW",
7680
"github_reviewed": true,
7781
"github_reviewed_at": "2026-01-14T21:06:08Z",
78-
"nvd_published_at": null
82+
"nvd_published_at": "2026-01-14T19:16:47Z"
7983
}
8084
}

0 commit comments

Comments
 (0)