Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Exploiting Adobe Magento RCE Vulnerability Exploited in the Wild

Posted on October 23, 2025October 23, 2025 By CWS

Hackers have begun actively concentrating on a crucial distant code execution flaw in Adobe’s Magento e-commerce platform, placing 1000’s of on-line shops at speedy threat simply six weeks after Adobe issued an emergency patch.

Often called SessionReaper and tracked as CVE-2025-54236, the vulnerability permits unauthenticated attackers to hijack buyer classes and doubtlessly execute arbitrary code, resulting in knowledge breaches and retailer compromises.

Safety agency Sansec reported blocking over 250 exploitation makes an attempt on October 22, 2025, with assaults originating from a number of IP addresses worldwide.​

Adobe Magento RCE Vulnerability Exploited

SessionReaper stems from an improper enter validation problem in Adobe Commerce and Magento Open Supply variations, together with 2.4.9-alpha2 and earlier, affecting the Commerce REST API.

Found by unbiased researcher Blaklis and patched by Adobe on September 9, 2025, the flaw permits attackers to add malicious information disguised as session knowledge through the /buyer/address_file/add endpoint, bypassing authentication.

This nested deserialization bug can result in full distant code execution, particularly on methods utilizing file-based session storage, although Redis or database-backed setups can also be susceptible.​

An in depth technical breakdown launched by Assetnote researchers on October 21, 2025, included proof-of-concept code demonstrating the exploit, successfully closing the window for undetected patching.

Sansec’s forensics workforce likened SessionReaper’s severity score of 9.1 on the CVSS scale to previous Magento threats like CosmicSting (CVE-2024-34102) in 2024, TrojanOrder (CVE-2022-24086) in 2022, and the notorious Shoplift vulnerability in 2015, every leading to 1000’s of hacked shops shortly after disclosure.

With exploit particulars now public, consultants predict widespread automated assaults inside 48 hours, fueled by scanning instruments that thrive on such high-impact flaws, Sansec stated.

Regardless of Adobe’s pressing advisory and hotfix availability, adoption stays alarmingly low. Sansec’s monitoring exhibits solely 38% of Magento shops have utilized protections six weeks post-patch, leaving 62% or three in 5 uncovered to this crucial menace.

Preliminary experiences from September indicated even fewer than one in three shops had been secured, highlighting persistent delays in e-commerce safety updates that expose delicate buyer knowledge like cost particulars to theft.

This vulnerability’s broad affect on international on-line retailers underscores the urgency, as unpatched websites turn out to be prime targets for credential stuffing, malware injection, and provide chain disruptions.​

Mitigations

Retailer house owners should act swiftly to mitigate dangers. Adobe recommends deploying the official patch from their repository or upgrading to the newest safe launch, with detailed directions of their developer information.

For speedy protection with out patching, activating an internet utility firewall (WAF) is essential; Sansec Protect, as an illustration, has blocked SessionReaper since discovery and provides a free month through coupon code SESSIONREAPER.

Noticed exploits hint again to IPs corresponding to 34.227.25.4, 44.212.43.34, 54.205.171.35, 155.117.84.134, and 159.89.12.166, delivering payloads that probe server configurations or set up backdoors.

Sansec continues real-time monitoring, urging retailers to observe for related exercise and comply with their reside assault dashboard for updates.

As exploitation ramps up, the e-commerce sector faces a possible wave of breaches paying homage to historic Magento incidents.​

Observe us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Adobe, Exploited, Exploiting, Hackers, Magento, RCE, Vulnerability, Wild

Post navigation

Previous Post: Secure AI at Scale and Speed — Learn the Framework in this Free Webinar
Next Post: AI Sidebar Spoofing Puts ChatGPT Atlas, Perplexity Comet and Other Browsers at Risk

Related Posts

Threat Actors Exploiting SonicWall SSL VPN Devices in Wild to Deploy Akira Ransomware Cyber Security News
New LNK Malware Uses Windows Binaries to Bypass Security Tools and Execute Malware Cyber Security News
Hackers Actively Attacking Linux SSH Servers to Deploy TinyProxy or Sing-box Proxy Tools Cyber Security News
CISA Warns of Apple iOS, iPadOS, and macOS 0-day Vulnerability Exploited in Attacks Cyber Security News
New Battering RAM Attack Bypasses Latest Defenses on Intel and AMD Cloud Processors Cyber Security News
L7 DDoS Botnet Hijacked 5.76M Devices to Launch Massive Attacks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New Rust-Based ChaosBot Malware Leverages Discord for Stealthy Command and Control
  • Microsoft Enhances Windows Security by Turning Off File Previews for Downloads
  • North Korean Hackers Lure Defense Engineers With Fake Jobs to Steal Drone Secrets
  • Hackers Exploited Samsung Galaxy S25 0-Day Vulnerability to Enable Camera and Track Location
  • SpaceX Disabled 2,500+ Starlink Terminals Tied to Scam Centers in Myanmar

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New Rust-Based ChaosBot Malware Leverages Discord for Stealthy Command and Control
  • Microsoft Enhances Windows Security by Turning Off File Previews for Downloads
  • North Korean Hackers Lure Defense Engineers With Fake Jobs to Steal Drone Secrets
  • Hackers Exploited Samsung Galaxy S25 0-Day Vulnerability to Enable Camera and Track Location
  • SpaceX Disabled 2,500+ Starlink Terminals Tied to Scam Centers in Myanmar

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News