Over 250 Magento Stores Hit Overnight as Hackers Exploit New Adobe Commerce Flaw
E-commerce security company Sansec has warned that threat actors have begun to exploit a recently disclosed security vulnerability in Adobe Commerce and Magento Open Source platforms, with more than 250 attack attempts recorded against multiple stores over the past 24 hours. The vulnerability in question is CVE-2025-54236 (CVSS score: 9.1), a critical improper input validation flaw that could be
AI Analysis
Technical Summary
CVE-2025-54236, dubbed SessionReaper, is a critical security vulnerability affecting Adobe Commerce and Magento Open Source platforms. It is an improper input validation flaw within the Commerce REST API that allows unauthenticated attackers to perform nested deserialization attacks, leading to remote code execution (RCE). This vulnerability enables attackers to take over customer accounts and upload malicious PHP webshells disguised as fake sessions via the '/customer/address_file/upload' endpoint. The flaw was responsibly disclosed by researcher Blaklis and patched by Adobe approximately six weeks prior to the reported exploitation surge. Despite the availability of patches, a significant portion (62%) of Magento stores remain unpatched, leaving them exposed to active exploitation. Attackers have been observed leveraging this vulnerability to drop PHP backdoors and extract PHP configuration details using phpinfo probes, facilitating further compromise and persistence. The attacks originated from multiple IP addresses, indicating coordinated exploitation attempts. This vulnerability is the second major deserialization flaw impacting Adobe Commerce in recent years, following the CosmicSting vulnerability (CVE-2024-34102). Given the critical CVSS score of 9.1 and the ease of exploitation without authentication or user interaction, this vulnerability represents a severe threat to e-commerce platforms relying on Magento. The rapid exploitation within 24 hours of public disclosure underscores the urgency for organizations to apply patches and implement additional security controls to mitigate risk.
Potential Impact
European organizations operating Magento-based e-commerce platforms face significant risks from this vulnerability. Successful exploitation can lead to complete compromise of customer accounts, unauthorized access to sensitive customer data, and deployment of persistent webshells enabling further malicious activities such as data exfiltration, defacement, or ransomware deployment. The availability of proof-of-concept exploits and active scanning by threat actors increases the likelihood of widespread attacks. Disruption of e-commerce services can result in financial losses, reputational damage, and regulatory penalties under GDPR due to potential data breaches. The high prevalence of Magento stores in Europe, combined with delayed patch adoption, amplifies the threat landscape. Attackers may also leverage compromised stores as pivot points for broader network intrusions. The impact extends beyond confidentiality to integrity and availability, threatening business continuity and customer trust.
Mitigation Recommendations
1. Immediate application of Adobe's official patches for CVE-2025-54236 is paramount; organizations must verify patch deployment across all Magento instances. 2. Conduct thorough audits of web server directories for unauthorized PHP files, especially in upload paths like '/customer/address_file/upload', and remove any detected webshells. 3. Implement strict input validation and sanitization controls at the application layer to prevent malicious payloads. 4. Employ Web Application Firewalls (WAFs) with updated signatures to detect and block exploitation attempts targeting the REST API endpoints. 5. Monitor logs for suspicious activities such as unusual file uploads, phpinfo probes, or anomalous API calls. 6. Restrict access to the Commerce REST API to trusted IP ranges where feasible and enforce rate limiting to mitigate automated attacks. 7. Enhance incident response readiness by preparing forensic capabilities to analyze potential breaches stemming from this vulnerability. 8. Educate development and operations teams about the risks of deserialization vulnerabilities and secure coding practices to prevent recurrence. 9. Regularly scan Magento environments with specialized vulnerability scanners to detect unpatched instances and configuration weaknesses. 10. Engage with Magento security advisories and threat intelligence feeds to stay informed about emerging exploitation trends.
Affected Countries
Netherlands, Germany, United Kingdom, France, Italy, Spain, Poland, Sweden
Over 250 Magento Stores Hit Overnight as Hackers Exploit New Adobe Commerce Flaw
Description
E-commerce security company Sansec has warned that threat actors have begun to exploit a recently disclosed security vulnerability in Adobe Commerce and Magento Open Source platforms, with more than 250 attack attempts recorded against multiple stores over the past 24 hours. The vulnerability in question is CVE-2025-54236 (CVSS score: 9.1), a critical improper input validation flaw that could be
AI-Powered Analysis
Technical Analysis
CVE-2025-54236, dubbed SessionReaper, is a critical security vulnerability affecting Adobe Commerce and Magento Open Source platforms. It is an improper input validation flaw within the Commerce REST API that allows unauthenticated attackers to perform nested deserialization attacks, leading to remote code execution (RCE). This vulnerability enables attackers to take over customer accounts and upload malicious PHP webshells disguised as fake sessions via the '/customer/address_file/upload' endpoint. The flaw was responsibly disclosed by researcher Blaklis and patched by Adobe approximately six weeks prior to the reported exploitation surge. Despite the availability of patches, a significant portion (62%) of Magento stores remain unpatched, leaving them exposed to active exploitation. Attackers have been observed leveraging this vulnerability to drop PHP backdoors and extract PHP configuration details using phpinfo probes, facilitating further compromise and persistence. The attacks originated from multiple IP addresses, indicating coordinated exploitation attempts. This vulnerability is the second major deserialization flaw impacting Adobe Commerce in recent years, following the CosmicSting vulnerability (CVE-2024-34102). Given the critical CVSS score of 9.1 and the ease of exploitation without authentication or user interaction, this vulnerability represents a severe threat to e-commerce platforms relying on Magento. The rapid exploitation within 24 hours of public disclosure underscores the urgency for organizations to apply patches and implement additional security controls to mitigate risk.
Potential Impact
European organizations operating Magento-based e-commerce platforms face significant risks from this vulnerability. Successful exploitation can lead to complete compromise of customer accounts, unauthorized access to sensitive customer data, and deployment of persistent webshells enabling further malicious activities such as data exfiltration, defacement, or ransomware deployment. The availability of proof-of-concept exploits and active scanning by threat actors increases the likelihood of widespread attacks. Disruption of e-commerce services can result in financial losses, reputational damage, and regulatory penalties under GDPR due to potential data breaches. The high prevalence of Magento stores in Europe, combined with delayed patch adoption, amplifies the threat landscape. Attackers may also leverage compromised stores as pivot points for broader network intrusions. The impact extends beyond confidentiality to integrity and availability, threatening business continuity and customer trust.
Mitigation Recommendations
1. Immediate application of Adobe's official patches for CVE-2025-54236 is paramount; organizations must verify patch deployment across all Magento instances. 2. Conduct thorough audits of web server directories for unauthorized PHP files, especially in upload paths like '/customer/address_file/upload', and remove any detected webshells. 3. Implement strict input validation and sanitization controls at the application layer to prevent malicious payloads. 4. Employ Web Application Firewalls (WAFs) with updated signatures to detect and block exploitation attempts targeting the REST API endpoints. 5. Monitor logs for suspicious activities such as unusual file uploads, phpinfo probes, or anomalous API calls. 6. Restrict access to the Commerce REST API to trusted IP ranges where feasible and enforce rate limiting to mitigate automated attacks. 7. Enhance incident response readiness by preparing forensic capabilities to analyze potential breaches stemming from this vulnerability. 8. Educate development and operations teams about the risks of deserialization vulnerabilities and secure coding practices to prevent recurrence. 9. Regularly scan Magento environments with specialized vulnerability scanners to detect unpatched instances and configuration weaknesses. 10. Engage with Magento security advisories and threat intelligence feeds to stay informed about emerging exploitation trends.
Affected Countries
Technical Details
- Article Source
- {"url":"https://thehackernews.com/2025/10/over-250-magento-stores-hit-overnight.html","fetched":true,"fetchedAt":"2025-10-23T06:01:02.638Z","wordCount":862}
Threat ID: 68f9c49e4e1be15805b4c918
Added to database: 10/23/2025, 6:01:02 AM
Last enriched: 10/23/2025, 6:01:18 AM
Last updated: 1/24/2026, 5:57:32 AM
Views: 615
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Cisco Fixes Actively Exploited Zero-Day CVE-2026-20045 in Unified CM and Webex
CriticalThreatsDay Bulletin: Pixel Zero-Click, Redis RCE, China C2s, RAT Ads, Crypto Scams & 15+ Stories
LowHackers Targeting Cisco Unified CM Zero-Day
CriticalChainlit AI Framework Flaws Enable Data Theft via File Read and SSRF Bugs
HighZoom and GitLab Release Security Updates Fixing RCE, DoS, and 2FA Bypass Flaws
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.