CVE-2025-54236
PHP vulnerability analysis and mitigation

Overview

CVE-2025-54236, also known as SessionReaper, is a critical security vulnerability discovered in Adobe Commerce and Magento Open Source platforms. The vulnerability, carrying a CVSS score of 9.1, was disclosed on September 9, 2025, and affects multiple versions including Adobe Commerce 2.4.9-alpha2 and earlier versions, as well as Magento Open Source platforms. It has been classified as an improper input validation vulnerability that could allow attackers to take control of customer accounts through the Commerce REST API (Hacker News, Sansec Research).

Technical details

The vulnerability is characterized as an improper input validation flaw (CWE-20) that combines a malicious session with a nested deserialization bug in Magento's REST API. The specific remote code execution vector requires file-based session storage, though systems using Redis or database sessions are also at risk. The vulnerability has been assigned a critical CVSS v3.1 score of 9.1 (Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N), indicating high severity with no user interaction required for exploitation (NVD, Sansec Research).

Impact

The vulnerability's exploitation could lead to customer account takeovers and potentially unauthenticated remote code execution under certain conditions. It is considered one of the more severe Magento vulnerabilities in its history, comparable to previous major incidents like Shoplift (2015), Ambionics SQLi (2019), TrojanOrder (2022), and CosmicSting (2024). The potential impact includes unauthorized access to customer accounts and possible system compromise (Sansec Research, Security Online).

Mitigation and workarounds

Adobe has released an emergency out-of-band patch for the vulnerability, breaking from their regular release schedule. The company has also deployed web application firewall (WAF) rules to protect environments against exploitation attempts. For immediate protection, merchants are advised to either apply the emergency patch or activate a WAF, with only Adobe Fastly and Sansec Shield currently blocking this attack. If patching cannot be done within 24 hours, running a malware scanner and rotating the secret crypt key is recommended (Sansec Research, Adobe Security).

Community reactions

The security community has expressed significant concern about the vulnerability, with Sansec describing it as one of the more severe Magento vulnerabilities in its history. Adobe's decision to provide advance notice only to Commerce customers, excluding open source Magento users, has caused frustration within the community. The emergency nature of the patch release, breaking Adobe's regular schedule, underscores the severity of the vulnerability (Security Online).

Additional resources


SourceThis report was generated using AI

Related PHP vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-54236CRITICAL9.1
  • PHPPHP
  • cpe:2.3:a:adobe:commerce
NoYesSep 09, 2025
GHSA-9v82-vcjx-m76jHIGH8.8
  • PHPPHP
  • shopware/core
NoYesSep 10, 2025
CVE-2025-52277MEDIUM6.1
  • PHPPHP
  • yeswiki/yeswiki
NoNoSep 09, 2025
CVE-2025-58759MEDIUM5.1
  • PHPPHP
  • datahihi1/tiny-env
NoYesSep 09, 2025
CVE-2025-58758MEDIUM5.1
  • PHPPHP
  • datahihi1/tiny-env
NoYesSep 09, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management