Adobe

Adobe

Adobe has disclosed a **critical vulnerability (CVE-2025-54236, dubbed *SessionReaper*)** in its **Commerce and Magento Open Source platforms**, allowing unauthenticated attackers to **bypass security features and hijack customer accounts** via the Commerce REST API. Though no active exploitation has been observed yet, a leaked hotfix may accelerate threat actor development of exploits. The flaw, deemed one of the most severe in Magento’s history, enables **session forging, privilege escalation, and potential code execution**—mirroring past high-impact vulnerabilities like *CosmicSting* and *Shoplift*.Adobe released an emergency patch on **September 9, 2025**, urging immediate deployment, as delayed action leaves systems exposed to **automated, large-scale attacks**. Cloud-based Adobe Commerce users received temporary protection via a WAF rule, but on-premise and unpatched instances remain at risk. The vulnerability’s exploitation relies on **default session storage configurations**, increasing its reach. Failure to patch could lead to **widespread account takeovers, financial fraud, and operational disruptions** for e-commerce businesses, with Adobe offering limited remediation support post-breach.Researchers warn of **high automation potential**, emphasizing the urgency for administrators to test and apply fixes despite potential compatibility issues with custom code.

Source: https://www.bleepingcomputer.com/news/security/adobe-patches-critical-sessionreaper-flaw-in-magento-ecommerce-platform/

TPRM report: https://www.rankiteo.com/company/adobe-commerce

"id": "ado1892518090925",
"linkid": "adobe-commerce",
"type": "Vulnerability",
"date": "5/2025",
"severity": "85",
"impact": "4",
"explanation": "Attack with significant impact with customers data leaks"
{'affected_entities': [{'customers_affected': 'Selected Adobe Commerce and '
                                              'Magento Open Source customers '
                                              '(exact number undisclosed)',
                        'industry': 'Technology',
                        'location': 'Global',
                        'name': 'Adobe',
                        'size': 'Large Enterprise',
                        'type': 'Software Vendor'}],
 'attack_vector': ['Network', 'REST API Exploitation', 'Session Forging'],
 'customer_advisories': ['Urgent recommendation to apply the patch '
                         'immediately.',
                         'Warning about potential custom code breakage due to '
                         'disabled internal functionality.',
                         'Guidance to test the patch in non-production '
                         'environments first.'],
 'date_publicly_disclosed': '2025-09-04',
 'date_resolved': '2025-09-09',
 'description': 'Adobe has disclosed a critical vulnerability '
                "(CVE-2025-54236), dubbed 'SessionReaper,' in its Commerce and "
                'Magento Open Source platforms. The flaw allows '
                'unauthenticated attackers to take control of customer '
                'accounts via the Commerce REST API. Adobe released an '
                'emergency patch on September 9, 2025, after notifying '
                'selected customers on September 4. While no active '
                'exploitation has been observed, a leaked hotfix may give '
                'threat actors an advantage in developing exploits. The '
                'vulnerability is considered one of the most severe in '
                "Magento's history, with potential for automated, large-scale "
                'abuse. Administrators are urged to apply the patch '
                'immediately, though it may disrupt custom or external code '
                'due to disabled internal Magento functionality.',
 'impact': {'brand_reputation_impact': ['High (due to severity of '
                                        'vulnerability and historical '
                                        'context)'],
            'data_compromised': ['Potential Customer Account Data (if '
                                 'exploited)'],
            'identity_theft_risk': ['High (if accounts are compromised)'],
            'operational_impact': ['Potential disruption of custom/external '
                                   'code due to patch',
                                   'Urgent patching required'],
            'systems_affected': ['Adobe Commerce',
                                 'Magento Open Source (default file-system '
                                 'session storage configurations)']},
 'investigation_status': 'Ongoing (no active exploitation observed as of '
                         'disclosure)',
 'lessons_learned': ['Critical vulnerabilities in widely used e-commerce '
                     'platforms can have severe, automated exploitation risks.',
                     'Proactive patching and interim mitigations (e.g., WAF '
                     'rules) are essential for high-severity flaws.',
                     'Leaked hotfixes can accelerate threat actor exploit '
                     'development, emphasizing the need for rapid response.',
                     'Default configurations (e.g., file-system session '
                     'storage) can amplify vulnerability impact.'],
 'post_incident_analysis': {'corrective_actions': ['Patch deployment to '
                                                   'disable vulnerable '
                                                   'internal functionality.',
                                                   'WAF rule deployment for '
                                                   'cloud customers as interim '
                                                   'mitigation.',
                                                   'Documentation updates for '
                                                   'secure REST API usage.'],
                            'root_causes': ['Vulnerability in session handling '
                                            'via Commerce REST API '
                                            '(CVE-2025-54236).',
                                            'Default configuration storing '
                                            'session data on the file system '
                                            '(common across most stores).',
                                            'Potential leak of initial hotfix '
                                            'accelerating exploit '
                                            'development.']},
 'recommendations': ['Immediately apply the Adobe-provided patch for '
                     'CVE-2025-54236.',
                     'Test the patch in staging environments to identify '
                     'potential disruptions to custom/external code.',
                     'Monitor for unusual REST API activity or session '
                     'anomalies.',
                     'Review and harden session storage configurations (avoid '
                     'default file-system storage if possible).',
                     'Follow Adobe’s updated REST API documentation for secure '
                     'implementation practices.',
                     'Consider deploying WAF rules or behavioral protection '
                     'for on-premise installations.'],
 'references': [{'source': 'Sansec Advisory on SessionReaper'},
                {'source': 'Adobe Security Bulletin for CVE-2025-54236'},
                {'source': 'Adobe Commerce REST API Documentation Updates'}],
 'response': {'adaptive_behavioral_waf': ['Deployed for Adobe Commerce on '
                                          'Cloud as interim mitigation'],
              'communication_strategy': ['Direct notifications to selected '
                                         'customers (2025-09-04)',
                                         'Public security bulletin',
                                         'Urgent patching advisory'],
              'containment_measures': ['WAF rule deployed for Adobe Commerce '
                                       'on Cloud customers',
                                       'Emergency patch release'],
              'incident_response_plan_activated': True,
              'remediation_measures': ['Patch deployment (disables internal '
                                       'Magento functionality)',
                                       'Updated REST API documentation'],
              'third_party_assistance': ['Sansec (research and advisory)']},
 'stakeholder_advisories': ['Adobe notified selected Commerce customers on '
                            '2025-09-04 about the upcoming patch.',
                            'Public advisory issued with patch release on '
                            '2025-09-09.'],
 'title': 'Critical SessionReaper Vulnerability (CVE-2025-54236) in Adobe '
          'Commerce and Magento Open Source',
 'type': ['Vulnerability Disclosure',
          'Security Feature Bypass',
          'Unauthenticated Account Takeover'],
 'vulnerability_exploited': 'CVE-2025-54236 (SessionReaper - Session Data '
                            'Storage on File System)'}
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.