Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Attackers Hijacked 200+ Websites Exploiting Magento Vulnerability to Gain Root-level Access

Posted on January 30, 2026January 30, 2026 By CWS

A vital safety breach has uncovered a number of Magento e-commerce platforms worldwide as risk actors efficiently exploited a extreme authentication flaw to realize full system management.

The assault marketing campaign, recognized in January 2026, represents probably the most vital waves of coordinated net server compromises in current months, affecting a whole lot of on-line shops throughout completely different areas and industries.

The vulnerability on the heart of this assault is CVE-2025-54236, also called SessionReaper, which permits unauthorized entry by reusing session tokens that weren’t correctly invalidated by the Magento utility.

These session tokens perform like digital keys that confirm a consumer’s identification.

216 sufferer websites recognized (Supply – Oasis Safety)

When Magento fails to destroy these keys after customers log off, attackers can intercept and replay them to realize entry as legit directors, bypassing all password protections and safety measures.

Oasis Safety analysts recognized a number of impartial intrusion incidents the place completely different risk actors exploited CVE-2025-54236 in opposition to Magento environments throughout varied geographical areas, demonstrating widespread data and weaponization of this flaw.

The analysis crew found that attackers had scanned for susceptible methods on an enormous scale, figuring out over 1,000 susceptible Magento APIs and efficiently compromising 200 web sites with root-level administrative entry.

An infection mechanism

The an infection mechanism reveals how attackers systematically leveraged this vulnerability to ascertain full management over sufferer infrastructure.

As soon as attackers gained preliminary entry by way of session hijacking, they escalated their privileges to acquire root entry, the very best degree of system management on Linux servers.

This persistence tactic allowed them to deploy net shells, that are small scripts that grant attackers distant command execution capabilities for ongoing system manipulation and knowledge theft.

Proof exhibits that compromised methods contained delicate recordsdata displaying system consumer accounts and credentials, indicating thorough system exploration and potential knowledge exfiltration.

The investigation uncovered command and management infrastructure working from Finland and Hong Kong, with separate risk actors conducting net shell deployment operations particularly focusing on Magento websites in Canada and Japan.

1,460 vulneralbe APIs, success_api_2025.txt (Supply – Oasis Safety)

The attackers maintained detailed logs of compromised web sites and deployed shell paths, demonstrating organized operational safety and systematic focusing on methods.

Organizations working Magento should instantly patch this vulnerability and audit their server logs for suspicious session token utilization.

Structured log entries itemizing sufferer URLs, deployed net shell paths, and management keys, 404_key.txt (Supply – Oasis Safety)

The widespread nature of this marketing campaign underscores the vital significance of well timed safety updates and steady monitoring of e-commerce platforms internet hosting worthwhile buyer knowledge and cost info.

Observe us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Access, Attackers, Exploiting, Gain, Hijacked, Magento, Rootlevel, Vulnerability, Websites

Post navigation

Previous Post: White House Scraps ‘Burdensome’ Software Security Rules 
Next Post: Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access

Related Posts

NVIDIA NVDebug Tool Vulnerability Let Attackers Escalate Privileges Cyber Security News
2.15M Web Services Running Next.js Exposed Over Internet, Active Exploitation Underway – Patch Now Cyber Security News
DragonForce Ransomware Claimed To Compromise Over 120 Victims in The Past Year Cyber Security News
Cobalt Strike 4.12 Released With New Process Injection, UAC Bypasses and Malleable C2 Options Cyber Security News
Salesforce Confirms that Customers’ Data Was accessed Following the Gainsight Breach Cyber Security News
Threat Actors Combine Android Malware With Click Fraud Apps to Steal Login Credentials Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • 175,000 Exposed Ollama Hosts Could Enable LLM Abuse
  • TAMECAT PowerShell-Based Backdoor Exfiltrates Login Credentials from Microsoft Edge and Chrome
  • Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access
  • Attackers Hijacked 200+ Websites Exploiting Magento Vulnerability to Gain Root-level Access
  • White House Scraps ‘Burdensome’ Software Security Rules 

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • 175,000 Exposed Ollama Hosts Could Enable LLM Abuse
  • TAMECAT PowerShell-Based Backdoor Exfiltrates Login Credentials from Microsoft Edge and Chrome
  • Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access
  • Attackers Hijacked 200+ Websites Exploiting Magento Vulnerability to Gain Root-level Access
  • White House Scraps ‘Burdensome’ Software Security Rules 

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark