Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-24418: Improper Authorization (CWE-285) in Adobe Adobe Commerce

0
High
VulnerabilityCVE-2025-24418cvecve-2025-24418cwe-285
Published: Tue Feb 11 2025 (02/11/2025, 17:37:41 UTC)
Source: CVE Database V5
Vendor/Project: Adobe
Product: Adobe Commerce

Description

Adobe Commerce versions 2.4.8-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 and earlier are affected by an Improper Authorization vulnerability that could result in Privilege escalation. A low-privileged attacker could leverage this vulnerability to bypass security measures and gain unauthorized access. Exploitation of this issue does not require user interaction.

AI-Powered Analysis

AILast updated: 02/26/2026, 20:16:42 UTC

Technical Analysis

CVE-2025-24418 is an improper authorization vulnerability (CWE-285) identified in Adobe Commerce, affecting versions 2.4.8-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11, and earlier. The flaw allows a low-privileged attacker to bypass authorization checks, resulting in privilege escalation without requiring user interaction. The vulnerability is exploitable remotely over the network (AV:N), with low attack complexity (AC:L), and requires only low privileges (PR:L). The scope remains unchanged (S:U), but the impact on confidentiality and integrity is high (C:H/I:H), while availability is unaffected (A:N). This means an attacker can gain unauthorized access to sensitive data or perform unauthorized actions within the Adobe Commerce environment, potentially compromising the integrity of e-commerce operations. No patches or exploits are currently publicly available, but the vulnerability is published and should be considered critical for organizations using affected versions. The vulnerability stems from insufficient enforcement of authorization controls, allowing attackers to escalate privileges beyond their intended access level.

Potential Impact

The impact of CVE-2025-24418 is significant for organizations using affected Adobe Commerce versions. Successful exploitation can lead to unauthorized access to sensitive customer and business data, manipulation of e-commerce transactions, and potential disruption of business processes through integrity violations. Since availability is not impacted, service disruption is unlikely, but the confidentiality and integrity breaches can result in financial losses, reputational damage, and regulatory compliance issues, especially in industries handling payment and personal data. Attackers with low privileges can escalate their access, increasing the risk of insider threats or external attackers pivoting within the environment. The lack of required user interaction and network-based exploitability heightens the risk of automated or widespread attacks once exploit code becomes available.

Mitigation Recommendations

Organizations should immediately review and restrict user privileges within Adobe Commerce environments to the minimum necessary. Implement strict role-based access controls and audit authorization configurations to detect and prevent privilege escalation attempts. Monitor logs for unusual access patterns or privilege changes. Since no patches are currently available, consider deploying web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting authorization mechanisms. Engage with Adobe for updates and apply security patches as soon as they are released. Additionally, conduct penetration testing focused on authorization controls to identify and remediate weaknesses proactively. Segmentation of the e-commerce environment and limiting administrative access can further reduce risk exposure.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
adobe
Date Reserved
2025-01-21T17:00:45.701Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a0a45785912abc71d66283

Added to database: 2/26/2026, 7:51:51 PM

Last enriched: 2/26/2026, 8:16:42 PM

Last updated: 2/26/2026, 11:13:57 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses