
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2025-54236, also known as SessionReaper, is a critical security vulnerability discovered in Adobe Commerce and Magento Open Source platforms. The vulnerability, carrying a CVSS score of 9.1, was disclosed on September 9, 2025, and affects multiple versions including Adobe Commerce 2.4.9-alpha2 and earlier versions, as well as Magento Open Source platforms. It has been classified as an improper input validation vulnerability that could allow attackers to take control of customer accounts through the Commerce REST API (Hacker News, Sansec Research).
The vulnerability is characterized as an improper input validation flaw (CWE-20) that combines a malicious session with a nested deserialization bug in Magento's REST API. The specific remote code execution vector requires file-based session storage, though systems using Redis or database sessions are also at risk. The vulnerability has been assigned a critical CVSS v3.1 score of 9.1 (Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N), indicating high severity with no user interaction required for exploitation (NVD, Sansec Research).
The vulnerability's exploitation could lead to customer account takeovers and potentially unauthenticated remote code execution under certain conditions. It is considered one of the more severe Magento vulnerabilities in its history, comparable to previous major incidents like Shoplift (2015), Ambionics SQLi (2019), TrojanOrder (2022), and CosmicSting (2024). The potential impact includes unauthorized access to customer accounts and possible system compromise (Sansec Research, Security Online).
Adobe has released an emergency out-of-band patch for the vulnerability, breaking from their regular release schedule. The company has also deployed web application firewall (WAF) rules to protect environments against exploitation attempts. For immediate protection, merchants are advised to either apply the emergency patch or activate a WAF, with only Adobe Fastly and Sansec Shield currently blocking this attack. If patching cannot be done within 24 hours, running a malware scanner and rotating the secret crypt key is recommended (Sansec Research, Adobe Security).
The security community has expressed significant concern about the vulnerability, with Sansec describing it as one of the more severe Magento vulnerabilities in its history. Adobe's decision to provide advance notice only to Commerce customers, excluding open source Magento users, has caused frustration within the community. The emergency nature of the patch release, breaking Adobe's regular schedule, underscores the severity of the vulnerability (Security Online).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."