CVE-2025-54264: Cross-site Scripting (Stored XSS) (CWE-79) in Adobe Adobe Commerce
Adobe Commerce versions 2.4.9-alpha2, 2.4.8-p2, 2.4.7-p7, 2.4.6-p12, 2.4.5-p14, 2.4.4-p15 and earlier are affected by a stored Cross-Site Scripting (XSS) Cross-Site Scripting (XSS) vulnerability that could be abused by a high-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. A successful attacker can abuse this to achieve session takeover, increasing the confidentiality, and integrity impact to high. Exploitation of this issue requires user interaction in that a victim must browse to the page containing the vulnerable field. Scope is changed.
AI Analysis
Technical Summary
CVE-2025-54264 is a stored Cross-Site Scripting (XSS) vulnerability identified in Adobe Commerce versions 2.4.4-p15 through 2.4.9-alpha2 and earlier. The vulnerability arises from insufficient sanitization of user input in certain form fields, allowing a high-privileged attacker to inject malicious JavaScript code that is persistently stored on the server. When other users visit the affected page containing the injected script, the malicious code executes in their browsers within the security context of the Adobe Commerce application. This can lead to session hijacking, unauthorized actions, and data theft, severely impacting confidentiality and integrity. The vulnerability requires the attacker to have high privileges to inject the payload and requires victims to interact by visiting the compromised page. The CVSS v3.1 score is 8.1 (high), reflecting network attack vector, low attack complexity, high privileges required, user interaction needed, and a changed scope due to cross-site scripting. Although no known exploits are reported in the wild, the vulnerability poses a significant risk due to the widespread use of Adobe Commerce in e-commerce environments. The lack of a current patch increases the urgency for mitigation through compensating controls.
Potential Impact
The impact of CVE-2025-54264 is substantial for organizations running affected Adobe Commerce versions. Successful exploitation can lead to session hijacking, allowing attackers to impersonate legitimate users, including administrators, thereby compromising sensitive customer data, order information, and backend configurations. This undermines both confidentiality and integrity of the e-commerce platform. Attackers could manipulate transactions, steal payment information, or alter product listings, causing financial and reputational damage. The requirement for high privileges limits initial exploitation to trusted insiders or compromised accounts, but the persistent nature of stored XSS increases risk to all users who visit the affected pages. The vulnerability could also facilitate further attacks such as malware distribution or phishing campaigns. Given Adobe Commerce's global adoption, the threat affects a broad range of industries relying on secure online sales platforms.
Mitigation Recommendations
Organizations should immediately audit their Adobe Commerce installations to identify affected versions and restrict high-privilege account access to trusted personnel only. Until official patches are released, implement strict input validation and sanitization on all form fields to prevent malicious script injection. Deploy Content Security Policy (CSP) headers to restrict execution of unauthorized scripts and reduce the impact of XSS attacks. Regularly monitor logs for suspicious activity indicative of attempted exploitation. Educate users to avoid clicking on suspicious links and visiting untrusted pages within the commerce platform. Consider using Web Application Firewalls (WAFs) with rules tailored to detect and block XSS payloads targeting Adobe Commerce. Once Adobe releases patches, prioritize timely application to fully remediate the vulnerability. Additionally, conduct security reviews and penetration testing to verify the effectiveness of mitigations.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Japan, Netherlands, India, Brazil, Italy, Spain
CVE-2025-54264: Cross-site Scripting (Stored XSS) (CWE-79) in Adobe Adobe Commerce
Description
Adobe Commerce versions 2.4.9-alpha2, 2.4.8-p2, 2.4.7-p7, 2.4.6-p12, 2.4.5-p14, 2.4.4-p15 and earlier are affected by a stored Cross-Site Scripting (XSS) Cross-Site Scripting (XSS) vulnerability that could be abused by a high-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. A successful attacker can abuse this to achieve session takeover, increasing the confidentiality, and integrity impact to high. Exploitation of this issue requires user interaction in that a victim must browse to the page containing the vulnerable field. Scope is changed.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-54264 is a stored Cross-Site Scripting (XSS) vulnerability identified in Adobe Commerce versions 2.4.4-p15 through 2.4.9-alpha2 and earlier. The vulnerability arises from insufficient sanitization of user input in certain form fields, allowing a high-privileged attacker to inject malicious JavaScript code that is persistently stored on the server. When other users visit the affected page containing the injected script, the malicious code executes in their browsers within the security context of the Adobe Commerce application. This can lead to session hijacking, unauthorized actions, and data theft, severely impacting confidentiality and integrity. The vulnerability requires the attacker to have high privileges to inject the payload and requires victims to interact by visiting the compromised page. The CVSS v3.1 score is 8.1 (high), reflecting network attack vector, low attack complexity, high privileges required, user interaction needed, and a changed scope due to cross-site scripting. Although no known exploits are reported in the wild, the vulnerability poses a significant risk due to the widespread use of Adobe Commerce in e-commerce environments. The lack of a current patch increases the urgency for mitigation through compensating controls.
Potential Impact
The impact of CVE-2025-54264 is substantial for organizations running affected Adobe Commerce versions. Successful exploitation can lead to session hijacking, allowing attackers to impersonate legitimate users, including administrators, thereby compromising sensitive customer data, order information, and backend configurations. This undermines both confidentiality and integrity of the e-commerce platform. Attackers could manipulate transactions, steal payment information, or alter product listings, causing financial and reputational damage. The requirement for high privileges limits initial exploitation to trusted insiders or compromised accounts, but the persistent nature of stored XSS increases risk to all users who visit the affected pages. The vulnerability could also facilitate further attacks such as malware distribution or phishing campaigns. Given Adobe Commerce's global adoption, the threat affects a broad range of industries relying on secure online sales platforms.
Mitigation Recommendations
Organizations should immediately audit their Adobe Commerce installations to identify affected versions and restrict high-privilege account access to trusted personnel only. Until official patches are released, implement strict input validation and sanitization on all form fields to prevent malicious script injection. Deploy Content Security Policy (CSP) headers to restrict execution of unauthorized scripts and reduce the impact of XSS attacks. Regularly monitor logs for suspicious activity indicative of attempted exploitation. Educate users to avoid clicking on suspicious links and visiting untrusted pages within the commerce platform. Consider using Web Application Firewalls (WAFs) with rules tailored to detect and block XSS payloads targeting Adobe Commerce. Once Adobe releases patches, prioritize timely application to fully remediate the vulnerability. Additionally, conduct security reviews and penetration testing to verify the effectiveness of mitigations.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- adobe
- Date Reserved
- 2025-07-17T21:15:02.463Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68eeb4a054d2200316a0d6ab
Added to database: 10/14/2025, 8:37:52 PM
Last enriched: 2/27/2026, 5:30:31 AM
Last updated: 3/25/2026, 4:45:12 AM
Views: 159
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.