PT-2025-36491 · Adobe · Magento
Published
2025-09-08
·
Updated
2025-10-23
·
CVE-2025-54236
CVSS v2.0
9.4
9.4
Critical
Base vector | Vector | AV:N/AC:L/Au:N/C:C/I:C/A:N |
Name of the Vulnerable Software and Affected Versions
Adobe Commerce versions 2.4.4-p15 through 2.4.9-alpha2
Magento versions 2.3.1 and earlier
Description
Adobe Commerce and Magento are affected by an improper input validation issue. A successful attacker can exploit this to achieve session takeover, potentially leading to a high impact on confidentiality and integrity. Exploitation does not require user interaction. The vulnerability, dubbed SessionReaper, allows attackers to hijack customer accounts via the REST API. Automated exploitation is anticipated, and hundreds of exploitation attempts have already been recorded. The REST API’s
ServiceInputProcessor
is vulnerable due to improper input validation. This flaw could potentially lead to remote code execution.Recommendations
Apply the emergency patch released by Adobe for versions 2.4.4-p15 through 2.4.9-alpha2.
For versions 2.3.1 and earlier, update to a patched version.
Revoke existing sessions and rotate tokens as a precautionary measure.
Consider implementing Web Application Firewall (WAF) rules for Adobe Cloud users.
Exploit
Fix
LPE
RCE
Buffer Overflow
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Related Identifiers
BDU:2025-10942
CVE-2025-54236
GHSA-WH92-6Q6G-PX7J
Affected Products
Magento
References · 148
- 🔥 https://nullsecurityx.codes/cve-2025-54236-sessionreaper-unauthenticated-rce-in-magento · Exploit
- https://bdu.fstec.ru/vul/2025-10942 · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2025-54236 · Security Note
- https://helpx.adobe.com/security/products/magento/apsb25-88.html · Vendor Advisory
- https://osv.dev/vulnerability/GHSA-wh92-6q6g-px7j · Vendor Advisory
- https://osv.dev/vulnerability/CVE-2025-54236 · Vendor Advisory
- https://github.com/magento/magento2⭐ 11945 🔗 9397 · Note
- https://twitter.com/TweetThreatNews/status/1981254259657052460 · Twitter Post
- https://twitter.com/methodandmetric/status/1965587508516868420 · Twitter Post
- https://twitter.com/Alevskey/status/1981304651208134894 · Twitter Post
- https://twitter.com/CheckmarxZero/status/1966190593773625763 · Twitter Post
- https://twitter.com/zeeshankghouri/status/1967885264631591300 · Twitter Post
- https://twitter.com/TweetThreatNews/status/1965719099251515685 · Twitter Post
- https://twitter.com/Limecommercecom/status/1967786778427003040 · Twitter Post
- https://twitter.com/trubetech/status/1965444529097412772 · Twitter Post