Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Over 250 Magento Stores Hit Overnight as Hackers Exploit New Adobe Commerce Flaw

Over 250 Magento Stores Hit Overnight as Hackers Exploit New Adobe Commerce Flaw

Posted on October 23, 2025October 23, 2025 By CWS

Oct 23, 2025Ravie LakshmananData Breach / Vulnerability
E-commerce safety firm Sansec has warned that risk actors have begun to take advantage of a lately disclosed safety vulnerability in Adobe Commerce and Magento Open Supply platforms, with greater than 250 assault makes an attempt recorded in opposition to a number of shops over the previous 24 hours.
The vulnerability in query is CVE-2025-54236 (CVSS rating: 9.1), a essential improper enter validation flaw that could possibly be abused to take over buyer accounts in Adobe Commerce by the Commerce REST API.
Also called SessionReaper, it was addressed by Adobe final month. A safety researcher who goes by the identify Blaklis is credited with the invention and accountable disclosure of CVE-2025-54236.
The Dutch firm stated that 62% of Magento shops stay susceptible to the safety flaw six weeks after public disclosure, urging web site directors to use the patches as quickly as potential earlier than broader exploitation exercise picks up.

The assaults have originated from the next IP addresses, with unknown risk actors leveraging the flaw to drop PHP webshells or probe phpinfo to extract PHP configuration info.

34.227.25[.]4
44.212.43[.]34
54.205.171[.]35
155.117.84[.]134
159.89.12[.]166

“PHP backdoors are uploaded by way of ‘/buyer/address_file/add’ as a pretend session,” Sansec stated.
The event comes as Searchlight Cyber printed an in depth technical evaluation of CVE-2025-54236, describing it as a nested deserialization flaw that permits distant code execution.
It is price noting that CVE-2025-54236 is the second deserialization vulnerability impacting Adobe Commerce and Magento platforms in as a few years. In July 2024, one other essential flaw dubbed CosmicSting (CVE-2024-34102, CVSS rating: 9.8) was subjected to widespread exploitation.
With proof-of-concept (PoC) exploits and extra specifics now getting into public domains, it is crucial that customers transfer rapidly to use the fixes.

The Hacker News Tags:Adobe, Commerce, Exploit, Flaw, Hackers, Hit, Magento, Overnight, Stores

Post navigation

Previous Post: Critical Lanscope Endpoint Manager Bug Exploited in Ongoing Cyberattacks, CISA Confirms
Next Post: Multiple BIND 9 DNS Vulnerabilities Enable Cache Poisoning and Denial Of Service Attacks

Related Posts

Malicious VSX Extension “SleepyDuck” Uses Ethereum to Keep Its Command Server Alive Malicious VSX Extension “SleepyDuck” Uses Ethereum to Keep Its Command Server Alive The Hacker News
North Korean Hackers Combine BeaverTail and OtterCookie into Advanced JS Malware North Korean Hackers Combine BeaverTail and OtterCookie into Advanced JS Malware The Hacker News
Deploying AI Agents? Learn to Secure Them Before Hackers Strike Your Business Deploying AI Agents? Learn to Secure Them Before Hackers Strike Your Business The Hacker News
DarkSpectre Browser Extension Campaigns Exposed After Impacting 8.8 Million Users Worldwide DarkSpectre Browser Extension Campaigns Exposed After Impacting 8.8 Million Users Worldwide The Hacker News
How to Protect Your Backups How to Protect Your Backups The Hacker News
New Android Malware Wave Hits Banking via NFC Relay Fraud, Call Hijacking, and Root Exploits New Android Malware Wave Hits Banking via NFC Relay Fraud, Call Hijacking, and Root Exploits The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News