CVE-2025-54236
PHP Analisi e mitigazione delle vulnerabilità

Panoramica

CVE-2025-54236, also known as SessionReaper, is a critical security vulnerability discovered in Adobe Commerce and Magento Open Source platforms. The vulnerability, carrying a CVSS score of 9.1, was disclosed on September 9, 2025, and affects multiple versions including Adobe Commerce 2.4.9-alpha2 and earlier versions, as well as Magento Open Source platforms. It has been classified as an improper input validation vulnerability that could allow attackers to take control of customer accounts through the Commerce REST API (Hacker News, Sansec Research).

Dettagli tecnici

The vulnerability is characterized as an improper input validation flaw (CWE-20) that combines a malicious session with a nested deserialization bug in Magento's REST API. The specific remote code execution vector requires file-based session storage, though systems using Redis or database sessions are also at risk. The vulnerability has been assigned a critical CVSS v3.1 score of 9.1 (Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N), indicating high severity with no user interaction required for exploitation (NVD, Sansec Research).

Impatto

The vulnerability's exploitation could lead to customer account takeovers and potentially unauthenticated remote code execution under certain conditions. It is considered one of the more severe Magento vulnerabilities in its history, comparable to previous major incidents like Shoplift (2015), Ambionics SQLi (2019), TrojanOrder (2022), and CosmicSting (2024). The potential impact includes unauthorized access to customer accounts and possible system compromise (Sansec Research, Security Online).

Mitigazione e soluzioni alternative

Adobe has released an emergency out-of-band patch for the vulnerability, breaking from their regular release schedule. The company has also deployed web application firewall (WAF) rules to protect environments against exploitation attempts. For immediate protection, merchants are advised to either apply the emergency patch or activate a WAF, with only Adobe Fastly and Sansec Shield currently blocking this attack. If patching cannot be done within 24 hours, running a malware scanner and rotating the secret crypt key is recommended (Sansec Research, Adobe Security).

Reazioni della comunità

The security community has expressed significant concern about the vulnerability, with Sansec describing it as one of the more severe Magento vulnerabilities in its history. Adobe's decision to provide advance notice only to Commerce customers, excluding open source Magento users, has caused frustration within the community. The emergency nature of the patch release, breaking Adobe's regular schedule, underscores the severity of the vulnerability (Security Online).

Risorse aggiuntive


FonteQuesto report è stato generato utilizzando l'intelligenza artificiale

Imparentato PHP Vulnerabilità:

CVE ID

Severità

Punteggio

Tecnologie

Nome del componente

Exploit CISA KEV

Ha la correzione

Data di pubblicazione

CVE-2025-54236CRITICAL9.1
  • PHPPHP
  • cpe:2.3:a:adobe:commerce
NoSep 09, 2025
GHSA-9v82-vcjx-m76jHIGH8.8
  • PHPPHP
  • shopware/shopware
NoSep 10, 2025
CVE-2025-52277MEDIUM6.1
  • PHPPHP
  • yeswiki/yeswiki
NoNoSep 09, 2025
CVE-2025-58759MEDIUM5.1
  • PHPPHP
  • datahihi1/tiny-env
NoSep 09, 2025
CVE-2025-58758MEDIUM5.1
  • PHPPHP
  • datahihi1/tiny-env
NoSep 09, 2025

Valutazione gratuita delle vulnerabilità

Benchmark della tua posizione di sicurezza del cloud

Valuta le tue pratiche di sicurezza cloud in 9 domini di sicurezza per confrontare il tuo livello di rischio e identificare le lacune nelle tue difese.

Richiedi valutazione

Richiedi una demo personalizzata

Pronti a vedere Wiz in azione?

"La migliore esperienza utente che abbia mai visto offre piena visibilità ai carichi di lavoro cloud."
David EstlickCISO (CISO)
"Wiz fornisce un unico pannello di controllo per vedere cosa sta succedendo nei nostri ambienti cloud."
Adam FletcherResponsabile della sicurezza
"Sappiamo che se Wiz identifica qualcosa come critico, in realtà lo è."
Greg PoniatowskiResponsabile della gestione delle minacce e delle vulnerabilità