HomeVulnerabilityAdobe Commerce Flaw CVE-2025-54236 Lets Hackers Take Over Buyer Accounts

Adobe Commerce Flaw CVE-2025-54236 Lets Hackers Take Over Buyer Accounts

Adobe has warned of a crucial security flaw in its Commerce and Magento Open Supply platforms that, if efficiently exploited, might enable attackers to take management of buyer accounts.

The vulnerability, tracked as CVE-2025-54236 (aka SessionReaper), carries a CVSS rating of 9.1 out of a most of 10.0. It has been described as an improper enter validation flaw. Adobe stated it is not conscious of any exploits within the wild.

“A possible attacker might take over buyer accounts in Adobe Commerce by the Commerce REST API,” Adobe stated in an advisory issued at present.

The difficulty impacts the next merchandise and variations –

DFIR Retainer Services

Adobe Commerce (all deployment strategies):

  • 2.4.9-alpha2 and earlier
  • 2.4.8-p2 and earlier
  • 2.4.7-p7 and earlier
  • 2.4.6-p12 and earlier
  • 2.4.5-p14 and earlier
  • 2.4.4-p15 and earlier

Adobe Commerce B2B:

  • 1.5.3-alpha2 and earlier
  • 1.5.2-p2 and earlier
  • 1.4.2-p7 and earlier
  • 1.3.4-p14 and earlier
  • 1.3.3-p15 and earlier

Magento Open Supply:

  • 2.4.9-alpha2 and earlier
  • 2.4.8-p2 and earlier
  • 2.4.7-p7 and earlier
  • 2.4.6-p12 and earlier
  • 2.4.5-p14 and earlier
See also  Hacker legen Schweizer Industriekonzern Adval Tech lahm

Customized Attributes Serializable module:

Adobe, along with releasing a hotfix for the vulnerability, stated it has deployed net utility firewall (WAF) guidelines to guard environments towards exploitation makes an attempt which will goal retailers utilizing Adobe Commerce on Cloud infrastructure.

CIS Build Kits

“SessionReaper is without doubt one of the extra extreme Magento vulnerabilities in its historical past, akin to Shoplift (2015), Ambionics SQLi (2019), TrojanOrder (2022), and CosmicSting (2024),” e-commerce security firm Sansec stated.

The Netherlands-based agency stated it efficiently reproduced one doable technique to exploit CVE-2025-54236, however famous that there are different doable avenues to weaponize the vulnerability.

“The vulnerability follows a well-recognized sample from final 12 months’s CosmicSting assault,” it added. “The assault combines a malicious session with a nested deserialization bug in Magento’s REST API.”

“The particular distant code execution vector seems to require file-based session storage. Nevertheless, we advocate retailers utilizing Redis or database classes to take quick motion as nicely, as there are a number of methods to abuse this vulnerability.”

See also  Racing to Defend and Comply

Adobe has additionally shipped fixes to comprise a crucial path traversal vulnerability in ColdFusion (CVE-2025-54261, CVSS rating: 9.0) that would result in an arbitrary file system write. It impacts ColdFusion 2021 (Replace 21 and earlier), 2023 (Replace 15 and earlier), and 2025 (Replace 3 and earlier) on all platforms.

- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular