PT-2025-36491 · Adobe · Magento
Published
2025-09-08
·
Updated
2025-12-08
·
CVE-2025-54236
CVSS v2.0
9.4
9.4
Critical
| Base vector | Vector | AV:N/AC:L/Au:N/C:C/I:C/A:N |
Name of the Vulnerable Software and Affected Versions
Adobe Commerce versions 2.4.4-p15 through 2.4.9-alpha2
Description
Adobe Commerce and Magento are affected by an Improper Input Validation vulnerability. A successful attacker can exploit this flaw to achieve session takeover, potentially leading to high confidentiality and integrity impact. Exploitation does not require user interaction. Over 250 attacks have been reported, with approximately 62% of stores remaining unpatched. The vulnerability allows for unauthenticated remote code execution (RCE) via the REST API, potentially enabling attackers to deploy webshells and hijack customer accounts. The vulnerability, dubbed “SessionReaper” (CVE-2025-54236), is considered one of the most severe flaws in the product’s history. The vulnerability stems from improper input validation within the Custom Attributes Serializable module. The REST API’s ServiceInputProcessor is a key component in the exploitation process.
Recommendations
Apply the emergency patch released by Adobe (VULN-32437-2-4-X). Implement Web Application Firewall (WAF) rules to mitigate the risk. Revoke existing sessions and rotate tokens as a precautionary measure. Disable file-based session storage if feasible. Monitor for unusual activity, including unexpected PHP files, strange responses from phpinfo(), spikes in POST requests to REST API endpoints, and new user sessions created without action.
Exploit
Fix
RCE
LPE
Buffer Overflow
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Related Identifiers
BDU:2025-10942
CVE-2025-54236
GHSA-WH92-6Q6G-PX7J
Affected Products
Magento
References · 271
- 🔥 https://nullsecurityx.codes/cve-2025-54236-sessionreaper-unauthenticated-rce-in-magento · Exploit
- https://bdu.fstec.ru/vul/2025-10942 · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2025-54236 · Security Note
- https://osv.dev/vulnerability/CVE-2025-54236 · Vendor Advisory
- https://osv.dev/vulnerability/GHSA-wh92-6q6g-px7j · Vendor Advisory
- https://experienceleague.adobe.com/en/docs/experience-cloud-kcs/kbarticles/ka-27397 · Security Note, Vendor Advisory
- https://helpx.adobe.com/security/products/magento/apsb25-88.html · Vendor Advisory
- https://github.com/magento/magento2⭐ 11970 🔗 9401 · Note
- https://t.me/cibsecurity/86896 · Telegram Post
- https://twitter.com/konvis/status/1965431742346428572 · Twitter Post
- https://twitter.com/cyber_sec_raj/status/1982291444845936699 · Twitter Post
- https://twitter.com/ZeroPathLabs/status/1965422087884910749 · Twitter Post
- https://twitter.com/DConsultinguk/status/1981257559085375861 · Twitter Post
- https://twitter.com/offseq/status/1981254924445839551 · Twitter Post
- https://twitter.com/CyberDigests/status/1965453683828949423 · Twitter Post