Alert: Critical Vulnerability in Adobe Commerce (CVE-2025-54236)

Published:

spot_img

Urgent Security Advisory from Adobe: What You Need to Know About CVE-2025-54236

Adobe has recently issued a crucial security advisory pertaining to a vulnerability known as CVE-2025-54236, also referred to as SessionReaper. This issue affects Adobe Commerce and Magento Open-Source platforms. With a critical CVSS score of 9.1 out of 10, it signals a serious risk that could result in unauthorized access and the potential compromise of customer accounts via the Commerce REST API.

Understanding CVE-2025-54236

CVE-2025-54236 is categorized as an improper input validation vulnerability. According to Adobe, this flaw can be exploited by a malicious actor using the Commerce REST API to gain full control over customer accounts. While there are no confirmed instances of this vulnerability being actively exploited, Adobe has underlined its significance, urging users to implement security patches as an immediate measure.

“A potential attacker could take over customer accounts in Adobe Commerce through the Commerce REST API,” the advisory states (APSB25-88). This serves as a stark reminder of the vulnerabilities within widely used e-commerce systems.

Affected Products and Versions

This vulnerability impacts several versions of Adobe Commerce, Adobe Commerce B2B, and Magento Open Source. The specific versions at risk include:

  • Adobe Commerce: Versions 2.4.9-alpha2 and earlier
  • Magento Open Source: Versions 2.4.9-alpha2 and earlier
  • Adobe Commerce B2B: Versions 1.5.3-alpha2 and earlier
  • Custom Attributes Serializable Module: Versions 0.1.0 to 0.4.0

For a complete list of affected versions, refer to Adobe’s dedicated security bulletin.

The Patch: VULN-32437-2-4-X

To mitigate the risk posed by this vulnerability, Adobe has released a hotfix identified as VULN-32437-2-4-X-patch. Users are strongly encouraged to apply this patch at the earliest convenience. Ignoring this security update could leave systems vulnerable, and Adobe may be limited in its ability to provide support without the patch in place.

For those operating with the Custom Attributes Serializable module, an upgrade to version 0.4.0 or later is essential. Users can execute the following Composer command to make this update:

plaintext
composer require magento/out-of-process-custom-attributes=0.4.0 –with-dependencies

Protection for Cloud and Managed Services Users

If you are hosted on Adobe Commerce Cloud infrastructure, Adobe has already put Web Application Firewall (WAF) rules in place to help block potential exploitation attempts. Users on Managed Services should consult their Customer Success Engineer for assistance in applying the fix.

However, it’s important to understand that while WAF rules provide a layer of security, they do not eliminate the necessity of implementing the patch. These measures are interim solutions and should not be treated as a long-term fix.

Verifying the Patch

To confirm that the patch has been successfully applied, Adobe recommends using the Quality Patches Tool. For example, to check if a specific patch like VULN-27015-2.4.7_COMPOSER.patch has been installed, users can execute the following command:

plaintext
vendor/bin/magento-patches -n status | grep "27015|Status"

This command will yield an “Applied” status if the patch is effectively active, providing reassurance to administrators who need to validate the compliance of their systems.

The vulnerability was initially reported to Adobe by an independent security researcher known as blaklis. While no evidence suggests that SessionReaper has been weaponized, its potential implications for e-commerce businesses are substantial.

Urgent Call to Action

Given the extensive use of Adobe Commerce and Magento Open Source platforms in the e-commerce sector, the emergence of SessionReaper should raise immediate concerns. Organizations utilizing any affected versions must take prompt action:

  • Apply the VULN-32437-2-4-X patch without delay.
  • Upgrade the Custom Attributes Serializable module to version 0.4.0 or higher.
  • Confirm patch application with Adobe’s recommended verification tools.
  • Seek assistance from Adobe support or Customer Success Engineers as needed.

Adobe has made the latest security updates available via its official security bulletin, where users can find detailed instructions for applying security patches and other necessary resources to ensure system safety.

spot_img

Related articles

Recent articles

Saudi Arabia’s Prince Naif bin Abdulaziz International Airport EOI Tender Attracts 89 Local and International Firms

Saudi Arabia's Prince Naif bin Abdulaziz International Airport EOI Tender Attracts 89 Local and International Firms Saudi Arabia's MATARAT Holding, in partnership with the National...

LevelUp: Dhillon Andrew Kannabiran Unveils Self-Evolving CTF Platform to Revolutionize Cybersecurity Training with 300 Active Challenges.

LevelUp: Dhillon Andrew Kannabiran Unveils Self-Evolving CTF Platform to Revolutionize Cybersecurity Training with 300 Active Challenges During the recent Lunar New Year holidays, Dhillon Andrew...

Judan Financial Strengthens Global Asset Management with 50.1% Stake in Alpha Wave Global

Judan Financial Strengthens Global Asset Management with 50.1% Stake in Alpha Wave Global Strategic Investment Overview Judan Financial, a subsidiary of International Holding Company (IHC), has...

10 Essential Hacks to Enhance Your Dark Web Security

10 Essential Hacks to Enhance Your Dark Web Security The dark web, often associated with illicit activities, serves as a refuge for users seeking to...