Magento Download Security Patcheswestcoastfree

Magento Commerce and Open Source 2.3.2, 2.2.9 and 2.1.18 contain 75 security enhancements that help close Remote Code Execution (RCE), Cross-Site Scripting (XSS) and other vulnerabilities. These enhancements are described in three related blog posts — the post you’re currently reading plus these two separate posts, which you can find here: Part 2 and Part 3.

  1. Magento Download Security Patches West Coast Free Pack
  2. Security Shirt Patches

Merchants who have not previously downloaded a Magento 2 release should go straight to Magento Commerce or Open Source 2.3.2.

Please refer to Security Best Practices for additional information how to secure your site.

The Magento 2.1.18 software release marks the final supported software release for Magento version 2.1.x. As of June 30 2019, Magento 2.1.x will no longer receive security updates or product quality fixes now that its support window has expired.

To download the releases, choose from the following options:

Partners:

Download

Magento is making Content Security Policy available for Magento Open Source and Commerce v2.3.5-p1. The release of Magento 2.3.5-p1 marks the first phase of our implementation and makes CSP available in report-only mode by default. Magento Open Source delivers features to build and grow a unique online store from the ground up. However, if you need an all-in-one cloud solution that is optimized, easy to deploy, provides enhanced security, and is packed with additional integrated capabilities to accelerate sales; consider Magento.

Dec 10, 2019 Recently, the Magento Marketplace was acquired by Adobe and suffered a breach that exposed a limited amount of user data to an unknown third party. When Adobe discovered evidence of the breach, they temporarily shut the marketplace down so they could assess the extent of the breach. Magento-cloud-patches All Submissions you make to Magento Inc. (“Magento') through GitHub are subject to the following terms and conditions: (1) You grant Magento a perpetual, worldwide, non-exclusive, no charge, royalty free, irrevocable license under your applicable copyrights and patents to reproduce, prepare derivative works of, display, publically perform, subli. The sticky post by Sherrie on this forum says to log into your account and download the patch, but again, there is no way to get from the My Account page to the downloads. I had to Google for 'how to download Magento' in order to find the Tech Resources - Download page.

Magento Commerce 2.3.2 (New .zip file installations)

Partner Portal > Downloads > Magento Commerce 2.X > Magento Commerce 2.x Release > Version 2.3.2

Magento Commerce 2.2.9 (New .zip file installations)

Partner Portal > Downloads > Magento Commerce 2.X > Magento Commerce 2.x Release > Version 2.2.9

Magento Commerce 2.1.18 (New .zip file installations)

Partner Portal > Downloads > Magento Commerce 2.X > Magento Commerce 2.x Release > Version 2.1.18

Magento Commerce 2.3.2, 2.2.9 and 2.1.18 (New composer installations)

Magento Commerce 2.3.2, 2.2.9 and 2.1.18 (Composer upgrades)

Magento Commerce:

Magento Commerce 2.3.2 (New .zip file installations)

My Account > Downloads > Magento Commerce 2.X > Magento Commerce 2.x Release > Version 2.3.2

Magento Commerce 2.2.9 (New .zip file installations)

My Account > Downloads > Magento Commerce 2.X > Magento Commerce 2.x Release > Version 2.2.9

Magento Commerce 2.1.18 (New .zip file installations)

My Account > Downloads > Magento Commerce 2.X > Magento Commerce 2.x Release > Version 2.1.18

Magento Commerce 2.3.2, 2.2.9 and 2.1.18 (New composer installations)

Magento Commerce 2.3.2, 2.2.9 and 2.1.18 (Composer upgrades)

Magento Open Source:

Magento Open Source 2.3.2, 2.2.9 and 2.1.18 (New .zip file installations)

Magento Open Source Download Page > Download Tab

Magento Open Source 2.3.2, 2.2.9 and 2.1.18 (New composer installations)

Magento Open Source 2.3.2, 2.2.9 and 2.1.18 (Composer upgrades)

Magento Open Source 2.3.2, 2.2.9 and 2.1.18 (Developers contributing to the Open Source code base)

PRODSECBUG-2233: Stored cross-site scripting in the admin panel - CVE-2019-7877
Type:General: cross-site scripting
CVSSv3 Severity:9.6
Known Attacks:None (exploit details are available publicly)
Description:

A stored cross-site scripting vulnerability exists in the admin panel. This could be exploited by an authenticated user with privileges to the admin panel to inject malicious javascript. In some configurations, the issue could be exploited by an unauthenticated user using the store front. NOTE: Patch for this issue is available also for earlier versions of Magento - more details here.

Product(s) Affected:Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2
Fixed In:Magento 2.1.18, Magento 2.2.9, Magento 2.3.2
Reporter:Simon Scannell
PRODSECBUG-2296: Arbitrary code execution through design layout update - CVE-2019-7895
Type:General: Remote Code Execution
CVSSv3 Severity:9.1
Known Attacks:none
Description:

An authenticated user with admin privileges can execute arbitrary code through a crafted XML layout update.

Product(s) Affected:Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2
Fixed In:Magento 2.1.18, Magento 2.2.9, Magento 2.3.2
Reporter:Blaklis
PRODSECBUG-2298: Arbitrary code execution through product imports and design layout update - CVE-2019-7896
Type:General: Remote Code Execution
CVSSv3 Severity:9.1
Known Attacks:none
Description:

An authenticated user with admin privileges can execute arbitrary code through combination of product import via crafted csv file and XML layout update.

Product(s) Affected:Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2
Fixed In:Magento 2.1.18, Magento 2.2.9, Magento 2.3.2
Reporter:Edgar Boda-Majer
PRODSECBUG-2349: Arbitrary code execution via file upload in admin import feature - CVE-2019-7930
Type:File Problems: Unsafe File Upload
CVSSv3 Severity:9.1
Known Attacks:none
Description:

An authenticated user with admin privileges to the import feature can execute arbitrary code by uploading a malicious csv file.

Product(s) Affected:Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2
Fixed In:Magento 2.1.18, Magento 2.2.9, Magento 2.3.2
Reporter:sambecks
PRODSECBUG-2202: Security bypass via form data injection - CVE-2019-7871
Type:General: Remote Code Execution
CVSSv3 Severity:9.1
Known Attacks:none
Description:

An authenticated user can inject form data and bypass security protections that prevent arbitrary PHP script upload.

Product(s) Affected:Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2
Fixed In:Magento 2.1.18, Magento 2.2.9, Magento 2.3.2
Reporter:Max Chadwick
Magento Download Security Patcheswestcoastfree
PRODSECBUG-2375: Arbitrary code execution via malicious XML layouts - CVE-2019-7942
Type:General: Remote Code Execution
CVSSv3 Severity:9.1
Known Attacks:none
Description:

An authenticated user with admin privileges can execute arbitrary code when creating a product via malicious XML layouts.

Product(s) Affected:Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2
Fixed In:Magento 2.1.18, Magento 2.2.9, Magento 2.3.2
Reporter:Charles Fol
PRODSECBUG-2306: Remote code execution through crafted email templates - CVE-2019-7903
Type:General: Remote Code Execution
CVSSv3 Severity:9.0
Known Attacks:none
Description:

An authenticated user with admin privileges can execute arbitrary code through crafted email template code when previewing the template.

Product(s) Affected:Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2
Fixed In:Magento 2.1.18, Magento 2.2.9, Magento 2.3.2
Reporter:Karim El Ouerghemmi
PRODSECBUG-2351: Arbitrary code execution via crafted sitemap creation - CVE-2019-7932
Type:General: Remote Code Execution
CVSSv3 Severity:9.0
Known Attacks:none
Description:

An authenticated user with admin privileges to create sitemaps can execute arbitrary code by crafted filenames that include php extension within the XML filename.

Product(s) Affected:Magento Open Source prior to 1.9.4.2, and Magento Commerce prior to 1.14.4.2, Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2
Fixed In:Magento Open Source 1.9.4.2, Magento Commerce 1.14.4.2, SUPEE-11155, Magento 2.1.18, Magento 2.2.9, Magento 2.3.2
Reporter:Simon Scannell
PRODSECBUG-2266: Arbitrary code execution through malicious elastic search module configuration - CVE-2019-7885
Type:General: Remote Code Execution
CVSSv3 Severity:9.0
Known Attacks:none
Description:

An authenticated user with privileges to configure the catalog search can execute arbitrary code through malicious configuration of the Elastic search module.

Product(s) Affected:Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2
Fixed In:Magento 2.1.18, Magento 2.2.9, Magento 2.3.2
Reporter:Simon Scannell
PRODSECBUG-2429: Insecure object reference via customer REST API - CVE-2019-7950
Type:General: Information Leakage
CVSSv3 Severity:8.8
Known Attacks:none
Description:

Unauthenticated users can pass arbitrary values for company attributes parmeters via POST and PUT action and assign themselves to arbitray company effectively gaining access to company's confidental information.

Product(s) Affected:Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2
Fixed In:Magento 2.1.18, Magento 2.2.9, Magento 2.3.2
Reporter:Internal Penetration Testing
PRODSECBUG-2307: Insufficient enforcement of user access controls can lead to unauthorized environment configuration changes - CVE-2019-7904
Type:Privilege Escalation & Enumeration: Broken Authentication and Session Management
CVSSv3 Severity:8.5
Known Attacks:none
Description:

Insufficient enforcement of user access controls can be abused by a low-privileged user to make unauthorized environment configuration changes, such as removing security controls.

Product(s) Affected:Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2
Fixed In:Magento 2.1.18, Magento 2.2.9, Magento 2.3.2
Reporter:Edgar Boda-Majer
Magento Download Security Patcheswestcoastfree
PRODSECBUG-2198: SQL Injection due to a flaw in MySQL adapter - CVE-2019-7139
Type:General: SQL Injection (Blind Read)
CVSSv3 Severity:8.2
Known Attacks:none
Description:

An unauthenticated user in Magento 2.x, or an authenticated user in Magento 1.x, can execute SQL statements that allow arbitrary read access to the underlying database.

Note: this issue was addressed in previous patches 2.2.8 and 2.3.1 and also in separately released patches PRODSECBUG-2198. In this release, it adds a fix for version 2.1.x.

Product(s) Affected:Magento 2.1 prior to 2.1.18
Fixed In:Magento 2.1.18
Reporter:Charles Fol
PRODSECBUG-2347: Insufficient brute-forcing defenses in the token exchange protocol could be abused in carding attacks - CVE-2019-7928
Type:Others: Denial of Service
CVSSv3 Severity:8.2
Known Attacks:Reported
Description:

Insufficient brute-forcing defenses in the token exchange protocol between Magento and payment processors could be abused in carding attacks.

Product(s) Affected:Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2
Fixed In:Magento 2.1.18, Magento 2.2.9, Magento 2.3.2
Reporter:
PRODSECBUG-2285: Arbitrary code execution due to unsafe handling of a carrier gateway - CVE-2019-7892
Type:General: Remote Code Execution
CVSSv3 Severity:8.0
Known Attacks:none
Description:

An authenticated user with admin privileges to access shipment settings can execute arbitrary code through server-side request forgery.

Product(s) Affected:Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2
Fixed In:Magento 2.1.18, Magento 2.2.9, Magento 2.3.2
Reporter:Max Chadwick
PRODSECBUG-2232: Arbitrary code execution via layout manipulation - CVE-2019-7876
Type:General: Remote Code Execution
CVSSv3 Severity:8.0
Known Attacks:none
Description:

An authenticated user with privileges to manipulate layout can execute arbitrary code through crafted custom layout update field.

Product(s) Affected:Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2
Fixed In:Magento 2.1.18, Magento 2.2.9, Magento 2.3.2
Reporter:Peter O'Callaghan
PRODSECBUG-2339: Arbitrary code execution due to unsafe handling of a carrier gateway - CVE-2019-7923
Type:General: Remote Code Execution
CVSSv3 Severity:8.0
Known Attacks:none
Description:

An authenticated user with admin privileges to manipulate shipment settings can execute arbitrary code through server-side request forgery

Product(s) Affected:Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2
Fixed In:Magento 2.1.18, Magento 2.2.9, Magento 2.3.2
Reporter:Max Chadwick
PRODSECBUG-2322: Arbitrary code execution due to unsafe handling of a shipping gateway - CVE-2019-7913
Type:General: Remote Code Execution
CVSSv3 Severity:7.9
Known Attacks:none
Description:

An authenticated user with admin privileges to manipulate shipment methods can execute arbitrary code through server-side request forgery.

Product(s) Affected:Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2
Fixed In:Magento 2.1.18, Magento 2.2.9, Magento 2.3.2
Reporter:Max Chadwick
PRODSECBUG-2320: Arbitrary code execution due to unsafe handling of system configuration - CVE-2019-7911
Type:General: Remote Code Execution
CVSSv3 Severity:7.9
Known Attacks:none
Description:

An authenticated user with admin privileges to manipulate system configuration can execute arbitrary code through server-side request forgery.

Product(s) Affected:Magento Open Source prior to 1.9.4.2, and Magento Commerce prior to 1.14.4.2, Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2
Fixed In:Magento Open Source 1.9.4.2, Magento Commerce 1.14.4.2, SUPEE-11155, Magento 2.1.18, Magento 2.2.9, Magento 2.3.2
Reporter:Max Chadwick
PRODSECBUG-2430: Security bypass via crafted SOAP requests - CVE-2019-7951
Type:General: Remote Code Execution
CVSSv3 Severity:7.4
Known Attacks:none
Description:

A SOAP web service endpoint does not properly enforce parameters related to access control list and customer identifications allowing arbitrary customer identification in crafted SOAP requests.

Product(s) Affected:Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2
Fixed In:Magento 2.1.18, Magento 2.2.9, Magento 2.3.2
Reporter:Internal Penetration Testing
PRODSECBUG-2177: Insufficient server side validations leads to Insecure File upload vulnerability - CVE-2019-7861
Type:Others: Security Implementation Flaw
CVSSv3 Severity:6.5
Known Attacks:none
Description:

An attacker can upload malicious files due to insufficient server side validations.

Product(s) Affected:Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2
Fixed In:Magento 2.1.18, Magento 2.2.9, Magento 2.3.2
Reporter:Internal Penetration Testing
PRODSECBUG-2325: Denial-of-service by forcing a store to respond with a 404 error - CVE-2019-7915
Type:General: Remote Code Execution
CVSSv3 Severity:6.5
Known Attacks:none
Description:

An attacker can cause a denial-of-service via a crafted request that results in the Magento store serving a cached 404 error response.

Product(s) Affected:Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2
Fixed In:Magento 2.1.18, Magento 2.2.9, Magento 2.3.2
Reporter:Matti Vapa
PRODSECBUG-2208: Insufficient authorization check when adding users to company accounts - CVE-2019-7872
Type:Privilege Escalation & Enumeration: Insecure Direct Object Reference
CVSSv3 Severity:6.0
Known Attacks:none
Description:

Insufficient authorization checks could be abused by a user with admin privileges to add users to company accounts, or modify existing user details.

Product(s) Affected:Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2
Fixed In:Magento 2.1.18, Magento 2.2.9, Magento 2.3.2
Reporter:craig-gene
PRODSECBUG-2222: Deletion of user roles via cross-site request forgery (CSRF) - CVE-2019-7874
Type:General: Cross Site Request Forgery
CVSSv3 Severity:5.8
Known Attacks:none
Description:

An attacker can delete user roles within the context of an authenticated administrator's session through cross-site request forgery (CSRF)

Product(s) Affected:Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2
Fixed In:Magento 2.1.18, Magento 2.2.9, Magento 2.3.2
Reporter:Djordje Marjanovic
PRODSECBUG-2346: Stored cross-site scripting in the admin panel - CVE-2019-7927
Type:General: cross-site scripting
CVSSv3 Severity:5.5
Known Attacks:none
Description:

A stored cross-site scripting vulnerability exists in the admin panel. This could be exploited by an authenticated user with privileges to the admin panel to inject malicious javascript.

Product(s) Affected:Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2
Fixed In:Magento 2.1.18, Magento 2.2.9, Magento 2.3.2
Reporter:Internal Penetration Testing
PRODSECBUG-2364: Stored cross-site scripting in the admin panel - CVE-2019-7936
Type:General: cross-site scripting
CVSSv3 Severity:5.5
Known Attacks:none
Description:

A stored cross-site scripting vulnerability exists in the admin panel. This could be exploited by an authenticated user with privileges to the admin panel to inject malicious javascript.

Product(s) Affected:Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2
Fixed In:Magento 2.1.18, Magento 2.2.9, Magento 2.3.2
Reporter:Max Chadwick
PRODSECBUG-2116: Stored cross-site scripting in the catalog events feature - CVE-2019-8068
Type:General: cross-site scripting
CVSSv3 Severity:5.5
Known Attacks:none
Description:

A stored cross-site scripting vulnerability exists in the catalog marketing events form. This could be exploited by an authenticated user with privileges to catalog events to inject malicious javascript.

Product(s) Affected:Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2
Fixed In:Magento 2.1.18, Magento 2.2.9, Magento 2.3.2
Reporter:Max Chadwick
PRODSECBUG-2182: Reflected cross-site scripting in the admin panel. - CVE-2019-7862
Type:General: cross-site scripting
CVSSv3 Severity:5.5
Known Attacks:none
Description:

A reflected cross-site scripting vulnerability exists in the admin panel. This could be exploited by an authenticated user with privileges to the admin panel to inject malicious javascript.

Product(s) Affected:Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2
Fixed In:Magento 2.1.18, Magento 2.2.9, Magento 2.3.2
Reporter:Magecraze
PRODSECBUG-2366: Stored cross-site scripting in the admin panel - CVE-2019-7937
Type:General: cross-site scripting
CVSSv3 Severity:5.5
Known Attacks:none
Description:

A stored cross-site scripting vulnerability exists in the admin panel. This could be exploited by an authenticated user with privileges to the admin panel to inject malicious javascript.

Product(s) Affected:Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2
Fixed In:Magento 2.1.18, Magento 2.2.9, Magento 2.3.2
Reporter:Max Chadwick
PRODSECBUG-2275: Unsafe functionality is exposed via email templates manipulation - CVE-2019-7889
Type:General: injection
CVSSv3 Severity:5.5
Known Attacks:none
Description:

An authenticated user with marketing manipulation privileges can invoke methods that alter data of the underlying model followed by corresponding database modifications.

Product(s) Affected:Magento Open Source prior to 1.9.4.2, and Magento Commerce prior to 1.14.4.2, Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2
Fixed In:Magento Open Source 1.9.4.2, Magento Commerce 1.14.4.2, SUPEE-11155, Magento 2.1.18, Magento 2.2.9, Magento 2.3.2
Reporter:Blaklis
PRODSECBUG-2299: Stored cross-site scripting in the admin panel - CVE-2019-7897
Type:General: cross-site scripting
CVSSv3 Severity:5.5
Known Attacks:none
Description:

A stored cross-site scripting vulnerability exists in the admin panel. This could be exploited by an authenticated user with privileges to the admin panel to inject malicious javascript.

Product(s) Affected:Magento Open Source prior to 1.9.4.2, and Magento Commerce prior to 1.14.4.2, Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2
Fixed In:Magento Open Source 1.9.4.2, Magento Commerce 1.14.4.2, SUPEE-11155, Magento 2.1.18, Magento 2.2.9, Magento 2.3.2
Reporter:Karim El Ouerghemmi

Magento 2.3.2, 2.2.9, and 2.1.18 contain 75 critical security enhancements. These enhancements are described in three related blog posts — the post you’re currently reading plus these two separate posts, which you can find here: Part 2 and Part 3.

Please refer to Security Best Practices for additional information on how to secure your site.

Be sure to implement and test the patch in a development environment first to confirm that it works as expected before deploying it to a production site.

Need Help Applying the Magento SUPEE-10266 Security Patch?

Magento Download Security Patches West Coast Free Pack


Certified Magento Developers for your Security Updates

Need help applying the most recent Magento security patch – SUPEE-10266?

Our Certified Magento Developers can help you apply the SUPEE-10266 security update to keep your Magento store safe.

The SUPEE-10266 patch addresses over 40 security updates and enhancements that help prevent cross-site request forgery, unauthorized data leaks, and admin remote code execution vulnerabilities. But don’t take our word for it. Our developers know Magento’s 150,000 lines of code inside and out, have been tested directly by Magento and are certified to work on Magento

Magento Download Security Patcheswestcoastfree

The Magento SUPEE-10266 security patch also updates the USPS API First-Class naming convention that causes first class shipping options to not appear at checkout.

It is highly recommended that all Magento merchants apply the SUPEE-10266 security update as soon as possible.

Security Shirt Patches

Our developers know Magento’s 150,000 lines of code inside and out, have been tested directly by Magento and are certified to work on Magento Websites. Customer Paradigm currently has 29 Magento 2 Trained Solution Partners. We can help you apply the SUPEE-10266 security patch to your Magento store quickly and seamlessly.

If you need reliable Magento Developers with experience to install your SUPEE-10266 upgrade, try us out!

Contact Customer Paradigm Today for your Magento SUPEE-10266 Update!

Free, No Obligation Consultation About Magento Programming:

Certified Magento Developers:

Our certified Magento Developers have worked on hundreds of eCommerce systems that process tens of thousands of transactions per day. We know the best practices for working on high-volume, live production systems (as well as low-volume Magento systems). Our Magento Developers write bug-free code that works! We have a dedicated team of testers to ensure that the delivered Magento Development works as requested.

U.S. Based

Our Certified Magento Developers are all located in the United States, here in Boulder, Colorado. No overseas outsourcing. We speak English, work during normal U.S. business hours and respond to you quickly.

Low Price for High-Quality Magento Developers

Our prices won’t break your budget for a high standard of customer service. Unlike other web development agencies, we also offer firm quotes for your project, so you know what to expect when you receive your bill.

Direct Access to a Magento Developer

You’ll get the name, email address and direct phone number of your Project Manager and Developer that is in charge of your Magento eCommerce project. Our Project Managers keep you apprised of your project’s budget and progress, and also ensure that your needs as a client are met exactly.

Call us today to get started! 303.473.4400 or visit here for a free consultation >>

Free, No Obligation Consultation About Magento Programming: