PT-2025-36491 · Adobe · Magento
Published
2025-09-08
·
Updated
2026-02-19
·
CVE-2025-54236
CVSS v2.0
9.4
9.4
Critical
| Base vector | Vector | AV:N/AC:L/Au:N/C:C/I:C/A:N |
Name of the Vulnerable Software and Affected Versions
Adobe Commerce versions 2.4.4 through 2.4.9-alpha2
Description
Adobe Commerce and Magento are affected by a critical Improper Input Validation vulnerability. A successful attacker can exploit this flaw to achieve session takeover, potentially leading to high confidentiality and integrity impact. Exploitation does not require user interaction. Over 250 attacks have been observed targeting systems vulnerable to this flaw, with approximately 62% of installations remaining unpatched. Attackers have been observed deploying webshells and exploiting the vulnerability for remote code execution. The vulnerability, dubbed “SessionReaper” (CVE-2025-54236), impacts the REST API and allows for unauthenticated access. The
ServiceInputProcessor is a key component involved in the exploitation.Recommendations
Apply the emergency patch released by Adobe for versions 2.4.4 through 2.4.9-alpha2.
Implement Web Application Firewall (WAF) rules to mitigate exploitation attempts.
Revoke existing sessions and rotate session tokens.
Monitor for unusual activity, including unexpected PHP files, strange responses from phpinfo(), and spikes in POST requests to REST API endpoints.
Disable file-based session storage if feasible.
Exploit
Fix
RCE
LPE
Buffer Overflow
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Related Identifiers
BDU:2025-10942
CVE-2025-54236
GHSA-WH92-6Q6G-PX7J
Affected Products
Magento
References · 342
- 🔥 https://nullsecurityx.codes/cve-2025-54236-sessionreaper-unauthenticated-rce-in-magento · Exploit
- https://nvd.nist.gov/vuln/detail/CVE-2025-54236 · Security Note
- https://experienceleague.adobe.com/en/docs/experience-cloud-kcs/kbarticles/ka-27397 · Security Note, Vendor Advisory
- https://osv.dev/vulnerability/GHSA-wh92-6q6g-px7j · Vendor Advisory
- https://osv.dev/vulnerability/CVE-2025-54236 · Vendor Advisory
- https://helpx.adobe.com/security/products/magento/apsb25-88.html · Vendor Advisory
- https://bdu.fstec.ru/vul/2025-10942 · Security Note
- https://github.com/magento/magento2⭐ 11970 🔗 9401 · Note
- https://twitter.com/TweetThreatNews/status/1981328736390660513 · Twitter Post
- https://t.me/cveNotify/148164 · Telegram Post
- https://twitter.com/konvis/status/1965431742346428572 · Twitter Post
- https://t.me/cveNotify/147269 · Telegram Post
- https://twitter.com/reverseame/status/2024571483444383986 · Twitter Post
- https://twitter.com/konvis/status/1983589978002096146 · Twitter Post
- https://t.me/cveNotify/149819 · Telegram Post