• 17/05/2026
  • Home
  • About us
  • Contact Us
  • Privacy Policy
  • Subscribe
  • Tech News
    Tech News

    OPPO Find N6 tries to erase the foldable crease with a ‘Zero-Feel’ display

    SentinelOne expands its AI security stack to on?prem and air?gapped environments

    Vertiv launches CoolPhase Wall, a wall-mounted cooling unit for edge and small server rooms

  • Reviews
    Reviews

    Teamwork.com Review

    Monday.com Review

    AI Deepfake Attacks are the biggest data security risk businesses face right now

    The ASUS ExpertCenter PN54 is a tiny AI powerhouse that actually delivers

    Nintendo Alarmo, Nintendo Sound Clock, bedside gadget, Zelda, Mario Odyssey, motion sensor alarm, sleep tracking, nostalgic gadgets, quirky alarm clock, tech reviews, gadget analysis, fan collectibles, device setup

    Nintendo Alarmo Review

  • Auto Tech
    Auto Tech

    FarEye rolls out PILOT, an agentic AI dispatcher for last?mile logistics

    George Russell tops Chinese Grand Prix FP1 as Mercedes show early pace at Shanghai

    Denza Z9 GT refresh brings a massive range boost to the luxury EV market

  • Troubleshoot
    Troubleshoot

    Best drones to buy for professional photography

    AirTag battery replacement is quick and easy, so here’s how you can do it yourself

    How to Run Windows XP on the Steam Deck: The 2026 Restoration Guide

    • Glossary
Reading
Adobe Patches Critical Flaw in Magento eCommerce Platform
ShareTweet
Parth
Tech News
10/09/2025 2 min read

Adobe Patches Critical Flaw in Magento eCommerce Platform

Adobe recently patched a critical vulnerability in its Commerce and Magento Open Source platforms. The flaw, named SessionReaper, affects the Web API and could allow attackers to take over user sessions without any interaction. Technically, this is an Improper Input Validation issue, tracked as CVE-2025-54236. It impacts the ServiceInputProcessor component, which handles API requests from external clients.

Versions affected include 2.4.9-alpha2, 2.4.8-p2, 2.4.7-p7, 2.4.6-p12, 2.4.5-p14, 2.4.4-p15, and earlier. Adobe rated the vulnerability as critical with a 9.1 out of 10 score on the National Vulnerability Database. Attackers could exploit it to gain full account access, which affects confidentiality and integrity. Adobe Commerce on Cloud customers are protected by the Web Application Firewall, but self-hosted Magento instances require immediate patching. The vulnerability is considered one of the most severe in the platform’s history.

How the Flaw Works

The flaw allows malicious API requests to bypass security checks. Normally, input validation ensures that requests are legitimate and prevent attackers from manipulating session tokens. SessionReaper bypasses this process, letting unauthorized users take control of accounts.

This is particularly dangerous for eCommerce stores because administrators and customers could have sensitive data exposed. Attackers could modify orders, access payment information, or change store settings. The patch addresses the validation problem by adding stricter checks and blocking unauthorized session activity. Adobe’s advisory warns that failing to apply the patch leaves systems exposed, with limited support available for remediation.

The Patch and Deployment Challenges

Adobe released the patch on September 9. Organizations running affected Magento versions are urged to apply it immediately. While the patch fixes the vulnerability, some users reported potential issues with external integrations. Certain Magento functions may be disabled or behave differently after applying the hotfix.

This is common in security patches that modify API handling or validation processes. Developers need to test the update in a staging environment before deploying it to live stores. In addition, the patch could be reverse-engineered by attackers if the initial hotfix is leaked. Sansec reported that the hotfix became available online before official deployment, which could allow attackers to analyze the changes and find additional vulnerabilities.

Security Best Practices for Magento Users

Beyond applying the SessionReaper patch, store owners should adopt standard security practices. This includes limiting admin access, using strong authentication methods, monitoring logs for unusual activity, and keeping all software up to date. Web Application Firewalls can help mitigate risks for online stores, but they are not a substitute for patches.

Regular audits of third-party extensions are also important. Extensions can introduce vulnerabilities if they are poorly coded or not maintained. Magento users should disable unused plugins and verify the source of every module. Combining patch management with monitoring and authentication safeguards improves resilience against future attacks and reduces the risk of session hijacking or data exposure.

Tags
account takeoverAdobe MagentoAPI securityCVE-2025-54236eCommerce cybersecurityeCommerce vulnerabilityMagento patchMagento securitySessionReaperWeb Application Firewall
Share
Previous AMD’s MegaPod: Taking on Nvidia’s SuperPod with 256 Instinct MI500 GPUs
Next Apple Issues Customer Warnings Following Discovery of Four Spyware Campaigns

Recent Posts

  • Vertiv to Acquire ThermoKey in Bid to Dominate Data Center Cooling Market
  • Vertiv Acquires ThermoKey to Bolster Data Center Cooling Capabilities
  • Neopets Makes Console Debut With ‘Mega Mini Games Collection’ After Two Decades
All Rights Reserved TechPlugged.com
  • Home
  • About us
  • Contact Us
  • Privacy Policy
  • Tech News
  • Reviews
  • Auto Tech
  • Troubleshoot
    • Glossary
Press ESC to close
[convertkit form=3237866]