Vulnerability Description
The Aimeos HTML client provides Aimeos HTML components for e-commerce projects. Starting in version 2020.04.1 and prior to versions 2020.10.27, 2021.10.21, 2022.10.12, 2023.10.14, and 2024.04.5, digital downloads sold in online shops can be downloaded without valid payment, e.g. if the payment didn't succeed. Versions 2020.10.27, 2021.10.21, 2022.10.12, 2023.10.14, and 2024.04.5 fix this issue.
CVSS Score
MEDIUM
Related Weaknesses (CWE)
References
- https://github.com/aimeos/ai-client-html/commit/12d8aad1a373bf9d350872501adec3e2
- https://github.com/aimeos/ai-client-html/commit/5a7249769142b3ce70959ab1fb70c7e7
- https://github.com/aimeos/ai-client-html/commit/6460ffe8f4929d864164aa96c5b49eca
- https://github.com/aimeos/ai-client-html/commit/7f01d2f4fbc67f5231fd84adeb835d28
- https://github.com/aimeos/ai-client-html/commit/fc611ff9a57e421d0ad9d99346b561ce
- https://github.com/aimeos/ai-client-html/security/advisories/GHSA-v4g2-cm5v-cxv7
- https://github.com/aimeos/ai-client-html/commit/12d8aad1a373bf9d350872501adec3e2
- https://github.com/aimeos/ai-client-html/commit/5a7249769142b3ce70959ab1fb70c7e7
- https://github.com/aimeos/ai-client-html/commit/6460ffe8f4929d864164aa96c5b49eca
- https://github.com/aimeos/ai-client-html/commit/7f01d2f4fbc67f5231fd84adeb835d28
- https://github.com/aimeos/ai-client-html/commit/fc611ff9a57e421d0ad9d99346b561ce
- https://github.com/aimeos/ai-client-html/security/advisories/GHSA-v4g2-cm5v-cxv7
FAQ
What is CVE-2024-37296?
CVE-2024-37296 is a vulnerability with a CVSS score of 5.3 (MEDIUM). The Aimeos HTML client provides Aimeos HTML components for e-commerce projects. Starting in version 2020.04.1 and prior to versions 2020.10.27, 2021.10.21, 2022.10.12, 2023.10.14, and 2024.04.5, digit...
How severe is CVE-2024-37296?
CVE-2024-37296 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-37296?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.