Security Flaw in Adobe Commerce (CVE-2025-54236) Exposes Customer Accounts to Hackers

Published:

spot_img

Critical Security Flaw in Adobe’s Commerce Platforms

Adobe has issued an urgent warning regarding a significant vulnerability affecting its Commerce and Magento Open Source platforms. Dubbed CVE-2025-54236, or SessionReaper, this flaw carries a high CVSS score of 9.1—indicating a critical risk. If exploited, it could permit attackers to seize control of customer accounts, raising serious security concerns for businesses using these platforms.

Nature of the Vulnerability

The vulnerability stems from improper input validation, which could potentially allow malicious actors to exploit the Commerce REST API. Although Adobe has not reported any active exploitation of this flaw in the wild, the implications for customer accounts are severe enough that immediate attention is warranted.

Affected Products and Versions

The following Adobe Commerce and Magento Open Source versions are impacted:

Adobe Commerce (all deployment methods)

  • 2.4.9-alpha2 and earlier
  • 2.4.8-p2 and earlier
  • 2.4.7-p7 and earlier
  • 2.4.6-p12 and earlier
  • 2.4.5-p14 and earlier
  • 2.4.4-p15 and earlier

Adobe Commerce B2B

  • 1.5.3-alpha2 and earlier
  • 1.5.2-p2 and earlier
  • 1.4.2-p7 and earlier
  • 1.3.4-p14 and earlier
  • 1.3.3-p15 and earlier

Magento Open Source

  • 2.4.9-alpha2 and earlier
  • 2.4.8-p2 and earlier
  • 2.4.7-p7 and earlier
  • 2.4.6-p12 and earlier
  • 2.4.5-p14 and earlier

Proactive Measures from Adobe

In response to this critical flaw, Adobe has not only released a hotfix but has also implemented web application firewall (WAF) rules designed to safeguard environments from possible exploitation attempts. This proactive step is especially crucial for merchants operating Adobe Commerce on Cloud infrastructure.

Comparisons to Historical Vulnerabilities

Security experts, including those at the e-commerce security company Sansec, have drawn parallels between SessionReaper and some of the most notable vulnerabilities in Magento’s history, such as Shoplift (2015) and CosmicSting (2024). The firm has successfully identified a potential method to exploit this flaw while noting that there are multiple avenues to weaponize it.

Specifics of the Exploitation

Sansec identifies that the exploitation method mirrors patterns seen in previous attacks. The combination of a harmful session with a nested deserialization bug in Magento’s REST API is a cause for significant concern. Although initial findings suggest that specific remote code execution requires file-based session storage, merchants utilizing Redis or database sessions are still advised to implement immediate security measures due to the various abuse methods available.

Additional Vulnerabilities Addressed

In addition to the SessionReaper issue, Adobe has also addressed another serious flaw involving ColdFusion. Titled CVE-2025-54261 and rated with a CVSS score of 9.0, this vulnerability could enable arbitrary file system writes. It’s critical for users of ColdFusion 2021 (Update 21 and earlier), 2023 (Update 15 and earlier), and 2025 (Update 3 and earlier) across all platforms to be aware of and remediate this risk.

Conclusion: The Importance of Vigilance

The details surrounding the SessionReaper vulnerability reinforce the need for constant vigilance concerning software security. Organizations using Adobe Commerce and Magento platforms must prioritize updating their systems and implementing recommended fixes to safeguard customer data and business operations.

spot_img

Related articles

Recent articles

Euro Systems Strengthens Portfolio with Launch of Europhon Acoustics for Superior Acoustic Solutions in UAE

Euro Systems Strengthens Portfolio with Launch of Europhon Acoustics for Superior Acoustic Solutions in UAE In a significant development for the acoustic solutions market, Europhon...

NIST Limits CVE Enrichment Amid 30% Surge in Vulnerability Submissions

NIST Limits CVE Enrichment Amid 30% Surge in Vulnerability Submissions The National Institute of Standards and Technology (NIST) has announced a pivotal shift in its...

OpenAI Strengthens Cybersecurity with Expanded Trusted Access Program and Launch of GPT 5.4 Cyber

OpenAI Strengthens Cybersecurity with Expanded Trusted Access Program and Launch of GPT 5.4 Cyber OpenAI has announced a significant expansion of its Trusted Access for...

Kaspersky MDR Enhances Automation and Incident Management, Accelerating Threat Response

Kaspersky MDR Enhances Automation and Incident Management, Accelerating Threat Response Kaspersky has unveiled significant advancements in its Managed Detection and Response (MDR) solution, emphasizing enhanced...