
PEACH
Un framework di isolamento del tenant
CVE-2025-54236, also known as SessionReaper, is a critical security vulnerability discovered in Adobe Commerce and Magento Open Source platforms. The vulnerability, carrying a CVSS score of 9.1, was disclosed on September 9, 2025, and affects multiple versions including Adobe Commerce 2.4.9-alpha2 and earlier versions, as well as Magento Open Source platforms. It has been classified as an improper input validation vulnerability that could allow attackers to take control of customer accounts through the Commerce REST API (Hacker News, Sansec Research).
The vulnerability is characterized as an improper input validation flaw (CWE-20) that combines a malicious session with a nested deserialization bug in Magento's REST API. The specific remote code execution vector requires file-based session storage, though systems using Redis or database sessions are also at risk. The vulnerability has been assigned a critical CVSS v3.1 score of 9.1 (Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N), indicating high severity with no user interaction required for exploitation (NVD, Sansec Research).
The vulnerability's exploitation could lead to customer account takeovers and potentially unauthenticated remote code execution under certain conditions. It is considered one of the more severe Magento vulnerabilities in its history, comparable to previous major incidents like Shoplift (2015), Ambionics SQLi (2019), TrojanOrder (2022), and CosmicSting (2024). The potential impact includes unauthorized access to customer accounts and possible system compromise (Sansec Research, Security Online).
Adobe has released an emergency out-of-band patch for the vulnerability, breaking from their regular release schedule. The company has also deployed web application firewall (WAF) rules to protect environments against exploitation attempts. For immediate protection, merchants are advised to either apply the emergency patch or activate a WAF, with only Adobe Fastly and Sansec Shield currently blocking this attack. If patching cannot be done within 24 hours, running a malware scanner and rotating the secret crypt key is recommended (Sansec Research, Adobe Security).
The security community has expressed significant concern about the vulnerability, with Sansec describing it as one of the more severe Magento vulnerabilities in its history. Adobe's decision to provide advance notice only to Commerce customers, excluding open source Magento users, has caused frustration within the community. The emergency nature of the patch release, breaking Adobe's regular schedule, underscores the severity of the vulnerability (Security Online).
Fonte: Questo report è stato generato utilizzando l'intelligenza artificiale
Valutazione gratuita delle vulnerabilità
Valuta le tue pratiche di sicurezza cloud in 9 domini di sicurezza per confrontare il tuo livello di rischio e identificare le lacune nelle tue difese.
Richiedi una demo personalizzata
"La migliore esperienza utente che abbia mai visto offre piena visibilità ai carichi di lavoro cloud."
"Wiz fornisce un unico pannello di controllo per vedere cosa sta succedendo nei nostri ambienti cloud."
"Sappiamo che se Wiz identifica qualcosa come critico, in realtà lo è."