Let's see how we can help you!
Leave a message and our dedicated advisor will contact you.
Send us a message
0/10000
Leave a message and our dedicated advisor will contact you.
Adobe has issued a warning regarding a critical vulnerability in Adobe Commerce and Magento Open Source platforms. The flaw, designated as CVE-2025-54236 and named "SessionReaper", has received a CVSS score of 9.1, classifying it as a critical severity threat.
The vulnerability stems from an input validation error and allows an attacker to take over customer accounts via the Commerce REST API. The attack does not require complex actions and can lead to serious consequences for online stores using these platforms.
Numerous versions of Adobe Commerce, Magento Open Source, and the Custom Attributes Serializable module (versions 0.1.0-0.4.0) are affected.
Although no active exploitation of this flaw has been recorded to date, Adobe has already released a hotfix and implemented appropriate WAF (Web Application Firewall) rules for its cloud customers.
Sansec, an e-commerce security firm, has rated "SessionReaper" as one of the most severe vulnerabilities in Magento's history, placing it on par with incidents like Shoplift (2015), TrojanOrder (2022), and CosmicSting (2024).

Chief Technology Officer at SecurHub.pl
PhD candidate in neuroscience. Psychologist and IT expert specializing in cybersecurity.
GitLab has released a critical security update patching vulnerability CVE-2025-8243 (CVSS 9.9), which allows for unauthorized execution of CI/CD pipelines and project takeover.

A review of the most dangerous cybersecurity vulnerabilities reported in the second week of September 2025—priority flaws concern Windows, Microsoft Office, Android, and ICS.
The Cl0p ransomware group exploited a zero-day in Oracle E-Business Suite (CVE-2025-61882), stealing data from multiple companies in August. Oracle just released a patch, but experts warn: check your systems now, as attacks continue.
Loading comments...