CVE-2026-40098: CWE-862: Missing Authorization in OpenMage magento-lts
A missing authorization vulnerability exists in OpenMage magento-lts versions prior to 20. 17. 0. The shared wishlist add-to-cart endpoint authorizes access using a public sharing code but does not verify that the wishlist item ID belongs to the shared wishlist. This allows an attacker to import items from another user's wishlist into their own cart, potentially exposing private custom-option data. If the product uses file custom options, this can lead to cross-user file disclosure. Version 20. 17. 0 addresses this issue.
AI Analysis
Technical Summary
OpenMage magento-lts before version 20.17.0 has a CWE-862 missing authorization vulnerability in the shared wishlist add-to-cart endpoint. The endpoint authorizes access with a public sharing code but loads the wishlist item by a global wishlist_item_id without verifying ownership. This flaw enables an attacker to combine a valid shared wishlist code with a victim's wishlist item ID to import victim items into the attacker's cart. The victim's private custom-option data, including file metadata, is copied during this process. Because the download endpoint for file custom options is not ownership-bound, this can escalate to cross-user file disclosure. The vulnerability is fixed in version 20.17.0.
Potential Impact
An attacker can import items from another user's wishlist into their own cart without proper authorization, leading to unauthorized access to private custom-option data. If file custom options are involved, this can result in cross-user file disclosure. The CVSS 4.0 score is 5.3 (medium severity), indicating a moderate impact due to network attack vector, low complexity, no user interaction, and limited confidentiality and integrity impact.
Mitigation Recommendations
Upgrade OpenMage magento-lts to version 20.17.0 or later, where this vulnerability is patched. Patch status is not explicitly confirmed in the vendor advisory, but the description states version 20.17.0 addresses the issue. Until upgrading, restrict access to the shared wishlist add-to-cart endpoint if possible. No other vendor mitigation guidance is available.
CVE-2026-40098: CWE-862: Missing Authorization in OpenMage magento-lts
Description
A missing authorization vulnerability exists in OpenMage magento-lts versions prior to 20. 17. 0. The shared wishlist add-to-cart endpoint authorizes access using a public sharing code but does not verify that the wishlist item ID belongs to the shared wishlist. This allows an attacker to import items from another user's wishlist into their own cart, potentially exposing private custom-option data. If the product uses file custom options, this can lead to cross-user file disclosure. Version 20. 17. 0 addresses this issue.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
OpenMage magento-lts before version 20.17.0 has a CWE-862 missing authorization vulnerability in the shared wishlist add-to-cart endpoint. The endpoint authorizes access with a public sharing code but loads the wishlist item by a global wishlist_item_id without verifying ownership. This flaw enables an attacker to combine a valid shared wishlist code with a victim's wishlist item ID to import victim items into the attacker's cart. The victim's private custom-option data, including file metadata, is copied during this process. Because the download endpoint for file custom options is not ownership-bound, this can escalate to cross-user file disclosure. The vulnerability is fixed in version 20.17.0.
Potential Impact
An attacker can import items from another user's wishlist into their own cart without proper authorization, leading to unauthorized access to private custom-option data. If file custom options are involved, this can result in cross-user file disclosure. The CVSS 4.0 score is 5.3 (medium severity), indicating a moderate impact due to network attack vector, low complexity, no user interaction, and limited confidentiality and integrity impact.
Mitigation Recommendations
Upgrade OpenMage magento-lts to version 20.17.0 or later, where this vulnerability is patched. Patch status is not explicitly confirmed in the vendor advisory, but the description states version 20.17.0 addresses the issue. Until upgrading, restrict access to the shared wishlist add-to-cart endpoint if possible. No other vendor mitigation guidance is available.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-04-09T01:41:38.536Z
- Cvss Version
- 4.0
- State
- PUBLISHED
- Remediation Level
- null
Threat ID: 69e6585619fe3cd2cd13fde8
Added to database: 4/20/2026, 4:46:14 PM
Last enriched: 4/20/2026, 5:02:09 PM
Last updated: 4/20/2026, 5:49:56 PM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.