So even upgrading to Magento 2.4.4 hasn't solved this issue.
Anyone Forum Moderator, please jump it.
Anyone else experienced this?
Shouldn't there me form validation as standard?
Thanks
Andy
If you are seeing orders being created, perhaps check to see if you are allowing guest access to the API:
1) You can add 'getTemplateFilter' to the list of banned keywords. You can also add citytoohot.fr.
Hi,
We are having the same issue on 2.4.4-p2. We are fully up to date and patched.
I believe this is a exploit linked to the email template vulnerability in previous releases yet we have received an order with getTemplate code as the name despite characters being limited to alphanumeric only and guest API is disabled.
@ianleaphotfa91 how do you add banned keywords described?
Thank you.
Same issue on 2.4.5-p1.
Guest WEB API access is disabled.
Guest checkout is disabled.
How do they create orders?
There doesn't seem to be much from Magento regarding this issue.
If you're patched & up to date then this exploit will be unsuccessful. It attempts to inject using the email template vulnerability identified by Magento in February 2022.
Related Patches: MDVA-43395 & MDVA-43443. See Patch release notes.
There is a Github issue open regarding access via the API when the Guest API & Guest Orders are disabled. Seems that Magento are working on this.
Did you get an answer to your banned keyword query? I don't know how to do it either
Many thanks
Same is there in Magento 2.4.5 P5.
Ok, I managed to deal with this, creating a custom module and block order execution if firstname or lastname contain characters like Curly Bracket, Less-Than Sign. etc. and log the attempt too. Hope this help.
https://github.com/magento/magento2/issues/39002#issuecomment-2291143582
Ok, I managed to deal with this, creating a custom module and block order execution if firstname or lastname contain characters like "}","{", <.. etc. and log the attempt too. Validation also for: Customer creation, Customer fields update. Hope this help.