Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-24411: Improper Access Control (CWE-284) in Adobe Adobe Commerce

0
High
VulnerabilityCVE-2025-24411cvecve-2025-24411cwe-284
Published: Tue Feb 11 2025 (02/11/2025, 17:37:51 UTC)
Source: CVE Database V5
Vendor/Project: Adobe
Product: Adobe Commerce

Description

Adobe Commerce versions 2.4.8-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 and earlier are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. A low-privileged attacker could leverage this vulnerability to bypass security measures and gain unauthorized access affecting Confidentiality and Integrity. Exploitation of this issue does not require user interaction.

AI-Powered Analysis

AILast updated: 02/26/2026, 20:18:20 UTC

Technical Analysis

CVE-2025-24411 is an improper access control vulnerability (CWE-284) identified in multiple versions of Adobe Commerce, specifically versions 2.4.8-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11, and earlier. The flaw allows a low-privileged attacker to bypass security controls designed to restrict access to sensitive functions or data. This bypass can lead to unauthorized access that compromises the confidentiality and integrity of the system and its data. The vulnerability does not require any user interaction, making it easier to exploit remotely over the network. The CVSS v3.1 base score of 8.1 reflects the high impact on confidentiality and integrity, with low attack complexity and no user interaction required. Although no public exploits have been reported yet, the nature of the vulnerability suggests that attackers could leverage it to escalate privileges or access sensitive business information within Adobe Commerce environments. Adobe Commerce is a widely used e-commerce platform, and improper access control issues can lead to data breaches, unauthorized transactions, or manipulation of commerce data. The vulnerability’s presence in multiple patched and unpatched versions indicates that many deployments remain at risk until updates are applied. The lack of a patch link in the provided data suggests that Adobe may be preparing or has recently released fixes, so organizations should monitor official channels closely.

Potential Impact

The impact of CVE-2025-24411 on organizations worldwide is significant due to the widespread use of Adobe Commerce in e-commerce platforms. Successful exploitation can lead to unauthorized access to sensitive customer data, order information, and potentially payment details, severely impacting confidentiality. Integrity is also at risk, as attackers could manipulate commerce data, alter orders, or disrupt business logic. Although availability is not directly affected, the breach of confidentiality and integrity can lead to reputational damage, regulatory penalties (e.g., GDPR, PCI DSS violations), and financial losses. Attackers with low privileges can escalate their access, increasing the threat surface. Organizations relying on Adobe Commerce for online sales, especially those handling large volumes of transactions or sensitive customer information, face heightened risks. The threat is particularly acute for businesses that have not applied recent security updates or rely on default or weak access controls. Given the lack of required user interaction, automated exploitation attempts could increase rapidly once exploit code becomes available, amplifying the risk of widespread compromise.

Mitigation Recommendations

Organizations should immediately inventory their Adobe Commerce deployments to identify affected versions. They should prioritize applying official patches from Adobe as soon as they are released. Until patches are available, implement network-level restrictions to limit access to Adobe Commerce administrative interfaces and APIs to trusted IP addresses only. Employ strict role-based access controls (RBAC) within Adobe Commerce to minimize privileges granted to users and services. Monitor logs and audit trails for unusual access patterns or privilege escalations. Use web application firewalls (WAFs) with updated signatures to detect and block exploitation attempts targeting this vulnerability. Conduct regular security assessments and penetration testing focused on access control mechanisms. Educate administrators about the risks of improper access control and enforce strong authentication methods, such as multi-factor authentication (MFA), to reduce the risk of credential compromise. Finally, maintain an incident response plan that includes procedures for handling potential breaches resulting from this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
adobe
Date Reserved
2025-01-21T17:00:45.700Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a0a45585912abc71d65d66

Added to database: 2/26/2026, 7:51:49 PM

Last enriched: 2/26/2026, 8:18:20 PM

Last updated: 2/26/2026, 11:13:58 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses