Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms

February 7, 2026

Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access

February 7, 2026

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

February 7, 2026
Facebook X (Twitter) Instagram
Sunday, February 8
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Adobe Releases Patch for Critical Flaw in Commerce and Magento
News

Adobe Releases Patch for Critical Flaw in Commerce and Magento

Team-CWDBy Team-CWDSeptember 11, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Threat researchers from the Sansec Forensics Team have warned about a critical vulnerability in Adobe Commerce and Magento, an open-source e-commerce platform owned by Adobe.

In a report published on September 8, Sansec warned that the flaw, dubbed SessionReaper, could allow customer account takeover and unauthenticated remote code execution (RCE) under certain conditions.

It was detected in August on the bug bounty platform HackerOne by a security researcher known as ‘Blaklis.’

“Each time, thousands of stores got hacked, sometimes within hours of the flaw being published,” the Sansec researchers wrote.

The Sansec report claimed that Adobe discussed an emergency fix internally in August, then announced it to selected Commerce customers in early September.

However, the Sansec report noted that the Adobe patch was accidentally leaked in early September, “so bad actors may already be working on the exploit code.”

Adobe Releases Emergency Patch

Adobe released an emergency patch on September 9 in its APSB25-88 security advisory, assigning the flaw a CVE identifier (CVE-2025-542360) and a CVSS rating of 9.1

The CVE entry noted that CVE-2025-542360 (aka SessionReaper) is a critical improper input validation flaw affecting Adobe Commerce versions 2.4.9-alpha2, 2.4.8-p2, 2.4.7-p7, 2.4.6-p12, 2.4.5-p14, 2.4.4-p15, and all prior releases.

The Adobe advisory also noted that if exploited, this vulnerability could allow an attacker to hijack active user sessions, resulting in severe compromises to both confidentiality and data integrity.

However, the Sansec researchers highlighted that neither the CVE entry nor the Adobe advisory mentions the risk of remote code execution, which has been confirmed by Blaklis on Slack.

According to the Sansec report, SessionReaper is one of the more severe Magento vulnerabilities in its history, comparable to Shoplift (2015), Ambionics SQLi (2019), TrojanOrder (2022) and CosmicSting (2024).

Neither Adobe nor Sansec has detected any evidence of active exploitation of the SessionReaper vulnerability in the wild at the time of writing.

How to Patch and Mitigate SessionReaper

The Sansec researchers have confirmed that users already protected by Sansec Shield are safeguarded against this Adobe Commerce vulnerability.

For those without this protection, they strongly advised testing and deploying the official patch immediately. However, they cautioned that it may disrupt custom or third-party integrations due to changes in internal Magento functionality. Adobe has provided a developer guide to assist with implementation.

If patching cannot be completed within 24 hours of disclosure, Sansec recommended enabling a Web Application Firewall (WAF) as an emergency measure.

For users who applied the patch after the 24-hour window, Sansec researchers urged running a malware scan to check for potential compromise.

Additionally, they recommended rotating the secret cryptographic key, as exposure could allow attackers to persistently manipulate CMS blocks. Immediate action is critical to mitigate risks associated with this high-severity flaw.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleKillSec Ransomware Hits Brazilian Healthcare IT Vendor
Next Article Ransomware Payments Plummet in Education Amid Enhanced Resiliency
Team-CWD
  • Website

Related Posts

News

CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms

February 7, 2026
News

Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access

February 7, 2026
News

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

February 7, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

Find your weak spots before attackers do

November 21, 2025

How cybercriminals are targeting content creators

November 26, 2025

What if your romantic AI chatbot can’t keep a secret?

November 18, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.