Local Storage seems to be disabled in your browser.
For the best experience on our site, be sure to turn on Local Storage in your browser.
CVE-2024-34102 Cosmic Sting Online Checker

Check whether your Magento store is affected by CVE-2024-34102(a.k.a Cosmic Sting) with only a few clicks.
You can also use it to check whether the applied patch works.
Simply input your store's Base URL and it only takes 20 seconds(on average) to tell you the result.
Tips
- Only check the websites owned by you or you are authorized by the store owner to perform the check
- Your store must be public accessible
- Possible result:
PASS!
FAIL!
Other notice
- Only supports
https
protocol - Don't hesitate to contact us if you have doubts on the result or have issues with checking your store
Valid Base URL
- ✓ https://www.example.com/
- ✓ https://www.example.com
Tailing slash is optional - ✗ https://www.example.com/some/path
path
is not allowed - ✗ http://www.example.com
http
protocol is not supported, usehttps
instead - ✗ https://www.example.com:3443
Specifyingport
is not allowed - ✗ https://username:password@www.example.com
userinfo
is not allowed
Share
If you found this tool useful, please share it!
Share on Facebook
Share on X
Share on Pinterest
Share on LinkedIn
Related Posts
Related Service & Extension
Categories
-
Tech
(11)
- How to (7)
- Security (6)
-
Customization
(2)
- Admin (1)
Recent Posts
Tags
Magento 2
security
CVE-2034-34102
Cosmic Sting
Customization
Development
cve
bug
WebAPI
How to
XXE
security tool
CosmicSting
cache
encryption key
Knockout.js
Javascript
Frontend
performance
fpc
header
x-magento-tags
tags
attack
defend
JWT
Authentication
key rotation
token
config.xml
ModularConfigSource
xml
framework
Admin Grid
Filter
UI Component
Search Criteria
SQL
Checkout
Payment Method
Customer Login
Check Customer Login
Asynchronous Way
CDN
Full Page Cache
ko.observable
Cloudflare
Fastly
Cloudflare Free Plan
online