{"id":"CVE-2022-34256","details":"Adobe Commerce versions 2.4.3-p2 (and earlier), 2.3.7-p3 (and earlier) and 2.4.4 (and earlier) are affected by an Improper Authorization vulnerability that could result in Privilege escalation. An attacker could leverage this vulnerability to access other user's data. Exploitation of this issue does not require user interaction.","aliases":["BIT-magento-2022-34256","GHSA-r7mm-grf3-5fjv"],"modified":"2026-03-14T11:50:07.967074Z","published":"2022-08-16T21:15:10.163Z","references":[{"type":"ADVISORY","url":"https://helpx.adobe.com/security/products/magento/apsb22-38.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/magento/devdocs","events":[{"introduced":"0"},{"last_affected":"81e9594ffa9c24a761ebd3a3c7c076078443f1e5"},{"introduced":"0"},{"last_affected":"81e9594ffa9c24a761ebd3a3c7c076078443f1e5"},{"introduced":"0"},{"last_affected":"81e9594ffa9c24a761ebd3a3c7c076078443f1e5"},{"introduced":"0"},{"last_affected":"81e9594ffa9c24a761ebd3a3c7c076078443f1e5"},{"introduced":"0"},{"last_affected":"81e9594ffa9c24a761ebd3a3c7c076078443f1e5"},{"introduced":"0"},{"last_affected":"81e9594ffa9c24a761ebd3a3c7c076078443f1e5"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"2.3.7-p2"},{"introduced":"0"},{"last_affected":"2.4.3-p1"},{"introduced":"0"},{"last_affected":"2.4.4-NA"},{"introduced":"0"},{"last_affected":"2.3.7-p2"},{"introduced":"0"},{"last_affected":"2.4.3-p1"},{"introduced":"0"},{"last_affected":"2.4.4-NA"}]}},{"type":"GIT","repo":"https://github.com/magento/magento2","events":[{"introduced":"f4c1d7526f05bdfb1327b0701cc345f94aadcaed"},{"fixed":"44a7b6079bcac5ba92040b16f4f74024b4f34d09"},{"introduced":"6729b6e01368248abc33300208eb292c95050203"},{"fixed":"4c36116dcf878e127059d9be9566a119783583f2"},{"introduced":"0"},{"last_affected":"44a7b6079bcac5ba92040b16f4f74024b4f34d09"},{"introduced":"0"},{"last_affected":"3c90474cbeac29921594ab97e68ca0502b5827a0"},{"introduced":"0"},{"last_affected":"ad91bd9eb0a691dc72bb8d794484dbd0b5a2a3f0"},{"introduced":"0"},{"last_affected":"4c36116dcf878e127059d9be9566a119783583f2"},{"introduced":"0"},{"last_affected":"1dd4ee8c3ab26dbb762fbaf9893c1f75148bb35b"},{"introduced":"f4c1d7526f05bdfb1327b0701cc345f94aadcaed"},{"fixed":"44a7b6079bcac5ba92040b16f4f74024b4f34d09"},{"introduced":"6729b6e01368248abc33300208eb292c95050203"},{"fixed":"4c36116dcf878e127059d9be9566a119783583f2"},{"introduced":"0"},{"last_affected":"44a7b6079bcac5ba92040b16f4f74024b4f34d09"},{"introduced":"0"},{"last_affected":"3c90474cbeac29921594ab97e68ca0502b5827a0"},{"introduced":"0"},{"last_affected":"ad91bd9eb0a691dc72bb8d794484dbd0b5a2a3f0"},{"introduced":"0"},{"last_affected":"4c36116dcf878e127059d9be9566a119783583f2"},{"introduced":"0"},{"last_affected":"1dd4ee8c3ab26dbb762fbaf9893c1f75148bb35b"}],"database_specific":{"versions":[{"introduced":"2.3.0"},{"fixed":"2.3.7"},{"introduced":"2.4.0"},{"fixed":"2.4.3"},{"introduced":"0"},{"last_affected":"2.3.7-NA"},{"introduced":"0"},{"last_affected":"2.3.7-p1"},{"introduced":"0"},{"last_affected":"2.3.7-p3"},{"introduced":"0"},{"last_affected":"2.4.3-NA"},{"introduced":"0"},{"last_affected":"2.4.3-p2"},{"introduced":"2.3.0"},{"fixed":"2.3.7"},{"introduced":"2.4.0"},{"fixed":"2.4.3"},{"introduced":"0"},{"last_affected":"2.3.7-NA"},{"introduced":"0"},{"last_affected":"2.3.7-p1"},{"introduced":"0"},{"last_affected":"2.3.7-p3"},{"introduced":"0"},{"last_affected":"2.4.3-NA"},{"introduced":"0"},{"last_affected":"2.4.3-p2"}]}}],"versions":["1.x-eos","2.0.10","2.0.11","2.0.12","2.0.13","2.0.14","2.0.15","2.0.16","2.0.17","2.0.18","2.0.8","2.0.9","2.1.0","2.1.1","2.1.10","2.1.11","2.1.12","2.1.13","2.1.14","2.1.15","2.1.16","2.1.17","2.1.18","2.1.2","2.1.3","2.1.4","2.1.5","2.1.6","2.1.7","2.1.8","2.1.9","2.2.0","2.2.1","2.2.10","2.2.11","2.2.2","2.2.3","2.2.4","2.2.5","2.2.6","2.2.7","2.2.8","2.2.9","2.3.0","2.3.1","2.3.2","2.3.2-p1","2.3.3","2.3.3-p1","2.3.4","2.3.5","2.3.6","2.3.6-p1","2.3.7-p2","2.4.0","2.4.1","2.4.1-p1","2.4.2","2.4.3-p1","2.4.4"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-34256.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}