Company
Date Published
Author
Detectify
Word count
996
Language
-
Hacker News points
None

Summary

A study of 30,000 Magento stores revealed that many remain vulnerable to three publicly available security flaws, despite patches being available for over a year. These vulnerabilities include the exposure of sensitive configuration files, an unprotected API for order history, and an easily accessible admin panel, with the study finding that 500 stores had publicly accessible configuration files, 1,500 vulnerable order history APIs, and 7,000 with exposed admin panels. Additionally, over half of the stores lacked default HTTPS, posing a significant risk to customer data. The findings highlight the importance of regular updates and adherence to security best practices for Magento and other content management systems, as many vulnerabilities persist due to ignored security warnings and a lack of auto-update features. The research underscores the need for proactive measures like enabling auto-updates or using security services to prevent data breaches.