HomeData BreachOver 250 Magento Shops Hit In a single day as Hackers Exploit...

Over 250 Magento Shops Hit In a single day as Hackers Exploit New Adobe Commerce Flaw

E-commerce security firm Sansec has warned that risk actors have begun to use a just lately disclosed security vulnerability in Adobe Commerce and Magento Open Supply platforms, with greater than 250 assault makes an attempt recorded towards a number of shops over the previous 24 hours.

The vulnerability in query is CVE-2025-54236 (CVSS rating: 9.1), a important improper enter validation flaw that could possibly be abused to take over buyer accounts in Adobe Commerce by way of the Commerce REST API.

Also referred to as SessionReaper, it was addressed by Adobe final month. A security researcher who goes by the title Blaklis is credited with the invention and accountable disclosure of CVE-2025-54236.

The Dutch firm mentioned that 62% of Magento shops stay susceptible to the security flaw six weeks after public disclosure, urging web site directors to use the patches as quickly as doable earlier than broader exploitation exercise picks up.

DFIR Retainer Services

The assaults have originated from the next IP addresses, with unknown risk actors leveraging the flaw to drop PHP webshells or probe phpinfo to extract PHP configuration info.

  • 34.227.25[.]4
  • 44.212.43[.]34
  • 54.205.171[.]35
  • 155.117.84[.]134
  • 159.89.12[.]166
See also  New 5Ghoul assault impacts 5G telephones with Qualcomm, MediaTek chips

“PHP backdoors are uploaded through ‘/buyer/address_file/add’ as a pretend session,” Sansec mentioned.

The event comes as Searchlight Cyber revealed an in depth technical evaluation of CVE-2025-54236, describing it as a nested deserialization flaw that permits distant code execution.

It is price noting that CVE-2025-54236 is the second deserialization vulnerability impacting Adobe Commerce and Magento platforms in as a few years. In July 2024, one other important flaw dubbed CosmicSting (CVE-2024-34102, CVSS rating: 9.8) was subjected to widespread exploitation.

With proof-of-concept (PoC) exploits and extra specifics now getting into public domains, it is crucial that customers transfer rapidly to use the fixes.

- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular