Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Exploiting Adobe Magento RCE Vulnerability Exploited in the Wild

Hackers Exploiting Adobe Magento RCE Vulnerability Exploited in the Wild

Posted on October 23, 2025October 23, 2025 By CWS

Hackers have begun actively concentrating on a crucial distant code execution flaw in Adobe’s Magento e-commerce platform, placing 1000’s of on-line shops at speedy threat simply six weeks after Adobe issued an emergency patch.

Often called SessionReaper and tracked as CVE-2025-54236, the vulnerability permits unauthenticated attackers to hijack buyer classes and doubtlessly execute arbitrary code, resulting in knowledge breaches and retailer compromises.

Safety agency Sansec reported blocking over 250 exploitation makes an attempt on October 22, 2025, with assaults originating from a number of IP addresses worldwide.​

Adobe Magento RCE Vulnerability Exploited

SessionReaper stems from an improper enter validation problem in Adobe Commerce and Magento Open Supply variations, together with 2.4.9-alpha2 and earlier, affecting the Commerce REST API.

Found by unbiased researcher Blaklis and patched by Adobe on September 9, 2025, the flaw permits attackers to add malicious information disguised as session knowledge through the /buyer/address_file/add endpoint, bypassing authentication.

This nested deserialization bug can result in full distant code execution, particularly on methods utilizing file-based session storage, although Redis or database-backed setups can also be susceptible.​

An in depth technical breakdown launched by Assetnote researchers on October 21, 2025, included proof-of-concept code demonstrating the exploit, successfully closing the window for undetected patching.

Sansec’s forensics workforce likened SessionReaper’s severity score of 9.1 on the CVSS scale to previous Magento threats like CosmicSting (CVE-2024-34102) in 2024, TrojanOrder (CVE-2022-24086) in 2022, and the notorious Shoplift vulnerability in 2015, every leading to 1000’s of hacked shops shortly after disclosure.

With exploit particulars now public, consultants predict widespread automated assaults inside 48 hours, fueled by scanning instruments that thrive on such high-impact flaws, Sansec stated.

Regardless of Adobe’s pressing advisory and hotfix availability, adoption stays alarmingly low. Sansec’s monitoring exhibits solely 38% of Magento shops have utilized protections six weeks post-patch, leaving 62% or three in 5 uncovered to this crucial menace.

Preliminary experiences from September indicated even fewer than one in three shops had been secured, highlighting persistent delays in e-commerce safety updates that expose delicate buyer knowledge like cost particulars to theft.

This vulnerability’s broad affect on international on-line retailers underscores the urgency, as unpatched websites turn out to be prime targets for credential stuffing, malware injection, and provide chain disruptions.​

Mitigations

Retailer house owners should act swiftly to mitigate dangers. Adobe recommends deploying the official patch from their repository or upgrading to the newest safe launch, with detailed directions of their developer information.

For speedy protection with out patching, activating an internet utility firewall (WAF) is essential; Sansec Protect, as an illustration, has blocked SessionReaper since discovery and provides a free month through coupon code SESSIONREAPER.

Noticed exploits hint again to IPs corresponding to 34.227.25.4, 44.212.43.34, 54.205.171.35, 155.117.84.134, and 159.89.12.166, delivering payloads that probe server configurations or set up backdoors.

Sansec continues real-time monitoring, urging retailers to observe for related exercise and comply with their reside assault dashboard for updates.

As exploitation ramps up, the e-commerce sector faces a possible wave of breaches paying homage to historic Magento incidents.​

Observe us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Adobe, Exploited, Exploiting, Hackers, Magento, RCE, Vulnerability, Wild

Post navigation

Previous Post: Secure AI at Scale and Speed — Learn the Framework in this Free Webinar
Next Post: AI Sidebar Spoofing Puts ChatGPT Atlas, Perplexity Comet and Other Browsers at Risk

Related Posts

South Korea Arrests Suspected Chinese Hacker Stolen Tens of Millions of Dollars from Victims South Korea Arrests Suspected Chinese Hacker Stolen Tens of Millions of Dollars from Victims Cyber Security News
71,000+ WatchGuard Devices Vulnerable to Remote Code Execution Attacks 71,000+ WatchGuard Devices Vulnerable to Remote Code Execution Attacks Cyber Security News
AMOS macOS Stealer Hides in GitHub With Advanced Sophistication Methods AMOS macOS Stealer Hides in GitHub With Advanced Sophistication Methods Cyber Security News
Mysterious Elephant APT Hackers Infiltrate Organization to Steal Sensitive Information Mysterious Elephant APT Hackers Infiltrate Organization to Steal Sensitive Information Cyber Security News
Scaling SOC Team Expertise With AI-powered Insights for Faster, Easier Understanding of Threats Scaling SOC Team Expertise With AI-powered Insights for Faster, Easier Understanding of Threats Cyber Security News
5 Common Back-to-School Online Scams Powered Using AI and How to Avoid Them 5 Common Back-to-School Online Scams Powered Using AI and How to Avoid Them Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News