Magento 2 Composer.lock Audit
Built for Magento agencies and maintainers. Upload a composer.lock and get a client-ready PDF: outdated/vulnerable modules, CVE mapping, vendor risk summary, core status, and upgrade recommendations.
This audit analyzes only what is recorded in your composer.lock file.
If your Magento instance modifies core files, applies patches manually, or bypasses Composer, the audit cannot detect those changes.
Algolia Search & Discovery for Magento 2 Has Untrusted Data Handling
libsodium has Incomplete List of Disallowed Inputs
Composer is vulnerable to ANSI sequence injection
AWS SDK for PHP's S3 Encryption Client has a Key Commitment Issue
Symfony's incorrect parsing of PATH_INFO can lead to limited authorization bypass
Magento vulnerable to stored Cross-Site Scripting (XSS)
Magento provides incorrect authorization through a security feature bypass
Magento vulnerable to stored Cross-Site Scripting (XSS)
Magento vulnerable to privilege escalation due to incorrect authorization
Magento allows incorrect authorization
Magento Community Edition Improper Input Validation vulnerability
Magento Cross-Site Request Forgery (CSRF) vulnerability
Magento has incorrect authorization issue that leads to arbitrary file system read
Magento Cross-site Scripting vulnerability
Magento vulnerable to path traversal
Magento Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability
Magento vulnerable to denial of service
Magento Authenticated Security feature bypass
Magento Security feature bypass
Magneto contains stored XSS vulnerability
No scans yet
Upload a composer.lock to create the first scan and watch it move from pending -> running -> finished.
FAQ
Tap to toggle answers. Questions are extra large for quick scanning.