Security for everyone

CVE-2015-2068 Scanner

Detects 'Cross-Site Scripting (XSS)' vulnerability in MAGMI (aka Magento Mass Importer) plugin for Magento Server affects v. before 2015-02-05.


Short Info



Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 sec

Scan only one




MAGMI (Magento Mass Importer) is a plugin that is used for bulk importing of products into Magento Server. It is a powerful tool that allows users to quickly add, update, or remove products with ease. The plugin is particularly useful for those who need to manage and update large catalogs of products. Once the product data is imported, users can check if it is correct or make changes if needed. MAGMI saves time and resources by minimizing the need for manual updates.

In 2015, a critical vulnerability was discovered in MAGMI. CVE-2015-2068 is a cross-site scripting (XSS) vulnerability that allows an attacker to inject arbitrary web script or HTML via the profile parameter to web/magmi.php or QUERY_STRING to web/magmi_import_run.php. This vulnerability allows attackers to exploit the web application and take control of user accounts, execute malicious scripts, and steal sensitive information.

If the MAGMI vulnerability is exploited, it can lead to severe consequences for users of Magento Server. Attackers can hijack the user session, steal login credentials, deface the website, inject malware, and exploit other vulnerabilities in the system. The vulnerability can be easily exploited by attackers without the need for authentication, making it a significant threat to web applications.

In conclusion, vulnerabilities such as CVE-2015-2068 in MAGMI can lead to severe consequences for users of Magento Server. provides a platform that can quickly detect and report vulnerabilities in your digital assets, including Magento Server. By staying vigilant and taking precautions to protect your web application, you can reduce the likelihood of being a victim of a cyberattack.



cyber security services for everyone one. Free security tools, continuous vulnerability scanning and many more.
Try it yourself,
control security posture