By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Sécurité Helvétique News | AmyrisSécurité Helvétique News | AmyrisSécurité Helvétique News | Amyris
  • Home
  • Compliance
    Compliance
    Show More
    Top News
    Shifting Sands: Leaders Are Feeling the Pressure of an Uncertain, Dynamic Risk Landscape
    23 February 2023
    How to Stay Ahead of Mobility Tax & Compliance Trends
    23 January 2024
    The Long and Winding Road to Custom-AI Compliance
    2 August 2024
    Latest News
    US Finalizes CMMC Rule: Cybersecurity Verification Now Determines Contract Eligibility for Defense Contractors
    13 December 2025
    Top 10 Risk & Compliance Trends for 2026
    7 December 2025
    How 2025 Redefined Telemarketing Compliance
    1 December 2025
    Advice for the AI Boom: Use the Tools, Not Too Much, Stay in Charge
    25 November 2025
  • Cyber Security
    Cyber Security
    Show More
    Top News
    New T-Mobile Breach Affects 37 Million Accounts – Krebs on Security
    21 February 2023
    New S1deload Malware Hijacking Users’ Social Media Accounts and Mining Cryptocurrency
    23 February 2023
    The cloud’s worst kept secret? Vulnerabilities • Graham Cluley
    27 February 2023
    Latest News
    North Korean Hackers Target Developers with Malicious npm Packages
    30 August 2024
    Russian Hackers Exploit Safari and Chrome Flaws in High-Profile Cyberattack
    29 August 2024
    Vietnamese Human Rights Group Targeted in Multi-Year Cyberattack by APT32
    29 August 2024
    2.5 Million Reward Offered For Cyber Criminal Linked To Notorious Angler Exploit Kit
    29 August 2024
  • Technology
    Technology
    Show More
    Top News
    These Fruits and Vegetables Have the Best (and Worst) Edible Yield
    4 April 2025
    Why XSS still matters: MSRC’s perspective on a 25-year-old threat  | MSRC Blog
    9 September 2025
    Best Amazon deal: Spend $40, save $10 on makeup, skincare, vitamins, and more
    22 February 2023
    Latest News
    Why XSS still matters: MSRC’s perspective on a 25-year-old threat  | MSRC Blog
    9 September 2025
    Microsoft Bug Bounty Program Year in Review: $13.8M in Rewards | MSRC Blog
    28 August 2025
    Microsoft Bounty Program Year in Review: $16.6M in Rewards  | MSRC Blog
    27 August 2025
    postMessaged and Compromised | MSRC Blog
    26 August 2025
  • Businness
    Businness
    Show More
    Top News
    Sunak secures backing of key Brexiters for N Ireland trade deal
    21 February 2023
    David Bowie’s vast archive donated to V&A Museum
    23 February 2023
    Russia’s war in Ukraine drags into second year with no end in sight By Reuters
    24 February 2023
    Latest News
    Blue Owl Technology Finance stock initiated with Buy rating by B.Riley
    16 December 2025
    Client Challenge
    15 December 2025
    At least 2 killed and 8 injured hurt in shooting at Brown University with suspect still at large
    14 December 2025
    Thailand vows to keep fighting Cambodia, despite Trump's ceasefire claim
    13 December 2025
  • ÉmissionN
    Émission
    Cyber Security Podcasts
    Show More
    Top News
    Stream episode Talking Cyber. Maine Gov’t Denies Breach Of State Systems. Heather Engel, Strategic Cyber Partners. by Cybercrime Magazine podcast
    22 February 2023
    Stream episode Cybercrime Wire For Mar. 1, 2023. Minneapolis Public Schools Cyberattack. WCYB Digital Radio. by Cybercrime Magazine podcast
    1 March 2023
    This Week In Tech. Tesla Price Cuts Continue, AI Voice Scam Damages. WCYB Digital Radio.
    9 March 2023
    Latest News
    Stream episode Cybercrime Magazine Update: Cybercrime In India. Sheer Volume Overwhelming Police Forces. by Cybercrime Magazine podcast
    3 March 2025
    Autonomous SOC. Why It’s A Breakthrough For The Mid-Market. Subo Guha, SVP of Product, Stellar Cyber
    2 March 2025
    Cyber Safety. Protecting Families From Smart Toy Risks. Scott Schober, Author, "Hacked Again."
    2 March 2025
    Cybercrime News For Feb. 25, 2025. Hackers Steal $49M from Infini Crypto Fintech. WCYB Digital Radio
    2 March 2025
Search
Cyber Security
  • Application Security
  • Darknet
  • Data Protection
  • network vulnerability
  • Pentesting
Compliance
  • LPD
  • RGPD
  • Finance
  • Medical
Technology
  • AI
  • MICROSOFT
  • VERACODE
  • CHECKMARKX
  • WITHSECURE
  • Amyris
  • Contact
  • Disclaimer
  • Privacy Policy
  • About us
© 2023 Sécurité Helvétique NEWS par Amyris Sarl. Tous droits réservés
Reading: SessionReaper (CVE-2025-54236) Exploited in Adobe Commerce
Share
Sign In
Notification Show More
Font ResizerAa
Sécurité Helvétique News | AmyrisSécurité Helvétique News | Amyris
Font ResizerAa
  • Home
  • Compliance
  • Cyber Security
  • Technology
  • Business
Search
  • Home
    • Compliance
    • Cyber Security
    • Technology
    • Businness
  • Legal Docs
    • Contact us
    • Disclaimer
    • Privacy Policy
    • About us
Have an existing account? Sign In
Follow US
  • Amyris
  • Contact
  • Disclaimer
  • Privacy Policy
  • About us
© 2023 Sécurité Helvétique par Amyris Sarl.
Sécurité Helvétique News | Amyris > Blog > VERACODE > SessionReaper (CVE-2025-54236) Exploited in Adobe Commerce
VERACODE

SessionReaper (CVE-2025-54236) Exploited in Adobe Commerce

webmaster
Last updated: 2025/11/11 at 8:25 AM
webmaster
Share
5 Min Read
SHARE

SessionReaper (CVE-2025-54236), an unauthenticated vulnerability in the Commerce REST API enables session takeover and possible RCE. If you run Adobe Commerce or Magento Open Source, this critical, pre-auth vulnerabilities can let attackers hijack customer accounts, manipulate orders, and  in many real-world setups drop persistent PHP web shells on your servers.

Adobe released an emergency hotfix; public PoCs and mass exploitation activity followed, so you must apply the official hotfix immediately and hunt your environments for indicators of compromise.

What is SessionReaper(CVE-2025-54236)

SessionReaper (CVE-2025-54236) is a critical improper input validation vulnerability in Adobe Commerce / Magento Open Source that allows an unauthenticated actor to take over customer sessions and, in many realistic deployments, to escalate to pre-auth remote code execution (RCE).

Risk Analysis

Severity: CRITICAL
CVSSv3.1: Base Score: 9.1 CRITICAL
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

Exploit available in public: Yes
Exploit complexity: Low

Root cause: improper input validation in the ServiceInputProcessor (Web API) that accepts and deserializes nested input types. The validation is insufficient, enabling crafted API requests to bypass expected type constraints and cause the backend to deserialize attacker-controlled payloads. Under some configurations (notably file-based PHP session storage or certain deserialization paths), this leads to remote code execution; at minimum it enables session takeover via the Commerce REST API.

Why it is critical: it is pre-auth (no user interaction required) and directly affects session handling and deserialization, two high-impact areas. That explains the high CVSS and the account takeover / RCE potential.

All Adobe Commerce/Magento 2.4.x versions are affected and must be patched immediately.

Impact / Real World Outcomes

  • Account takeover: attackers can hijack customer accounts (order history, stored payment tokens, address changes, etc.). Adobe and several vendors report account takeover as the primary scenario.
  • Remote code execution (RCE): technical analyses and POCs show that, in common configurations (especially file-based session storage), attackers can escalate to unauthenticated RCE and drop PHP web shells, giving persistent server access. Multiple researchers described nested deserialization enabling RCE.
  • Observed effects in the wild: mass probing, PHP backdoors/web shells dropped, phpinfo() reconnaissance and enumeration. Security vendors documented hundreds of attempts and many confirmed backdoors discovered in stores.

Key Indicators of a SessionReaper Compromise

  • Unauthenticated POSTs to API endpoints, especially file/upload endpoints
  • Newly created PHP files in upload/media directories
  • Requests containing serialized blobs, unusual __type fields, or deeply nested JSON
  • Evidence of phpinfo() probes, unexpected cron jobs, or new admin users

CVE-2025-54236: Immediate Mitigation Steps for SessionReaper

  1. Isolate affected node(s) (or throttle via WAF while preserving logs).
  2. Capture forensics: webroot, php-fpm/webserver logs, DB dumps.
  3. Remove web shells and restore from known-good deploy artifacts.
  4. Rotate all secrets and credentials (admin, API, DB).
  5. Rebuild nodes from trusted images and apply hotfix before reconnecting.
  6. Monitor closely for 30–90 days.

SessionReaper Defense: What Comes Next

  • Centralize session storage and harden deserialization code paths.
  • Automate version inventory and emergency patch workflows for platform components.
  • Combine WAF + runtime detection + file-integrity monitoring for layered defense.
  • Limit public exposure of sensitive API endpoints (IP allow-lists, zero-trust access).

AppTrana WAAP Coverage for CVE-2025-54236 (SessionReaper)

AppTrana WAAP delivers out-of-the-box protection against exploitation attempts targeting CVE-2025-54236. Its AI-powered managed WAF automatically analyzes and blocks malicious attempts abusing improper input validation, session manipulation, and deserialization pathways used to hijack accounts or achieve RCE.

The following example demonstrates how AppTrana WAAP mitigates exploitation attempts tied to CVE-2025-54236 (SessionReaper)

AppTrana WAAP Coverage for CVE-2025-54236 (SessionReaper)

Stay tuned for more relevant and interesting security articles. Follow Indusface on Facebook, Twitter, and LinkedIn.

AppTrana WAAP

Deepak

Deepak Kumar Choudhary

Deepak Choudhary is an adept Security Researcher at Indusface. He specializes in developing detection logic and signatures to identify various security vulnerabilities, including 0-day vulnerabilities, making him a frontline defender of digital environments.Driven by his passion for cyber defense, He continuously seeks to expand his knowledge of security concepts. He eagerly tackles the task of resolving vulnerable systems on platforms such as TryHackMe and HackTheBox, sharpening his skills in real-world scenarios.
Through his expertise and dedication, he is committed to fortifying digital landscapes, ensuring a safer online experience for users and organizations alike.

Contents
What is SessionReaper(CVE-2025-54236)Impact / Real World OutcomesKey Indicators of a SessionReaper CompromiseCVE-2025-54236: Immediate Mitigation Steps for SessionReaperSessionReaper Defense: What Comes NextAppTrana WAAP Coverage for CVE-2025-54236 (SessionReaper)

You Might Also Like

Best Agentic Pentesting Tools in 2026

Three New React Vulnerabilities Surface on the Heels of React2Shell

BNY builds “AI for everyone, everywhere” with OpenAI

How We Used Codex to Ship Sora for Android in 28 Days

Mend.io + Wiz: A New Code-to-Cloud Integration for Accurate, Context-Driven Risk Prioritization

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.

By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Whatsapp Whatsapp LinkedIn Reddit Telegram Email Copy Link Print
Share
Previous Article From Prompt Injection To Account Takeover · Embrace The Red
Next Article 8 Black Friday Candle Sales Worth Sniffing Around in 2025
Leave a comment Leave a comment

Comments (0) Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

235.3k Followers Like
69.1k Followers Follow
11.6k Followers Pin
56.4k Followers Follow
136k Subscribers Subscribe
4.4k Followers Follow
- Advertisement -
Ad imageAd image

Latest News

From Prompt Injection To Account Takeover · Embrace The Red
Pentesting 16 December 2025
6 Personalized Stationery Sets for a Fancy Kind of Sentimentality
ARCHITECTURE 16 December 2025
Switzerland to tighten rules on military service for dual nationals
SWITZERLAND 16 December 2025
From Prompt Injection To Account Takeover · Embrace The Red
Pentesting 16 December 2025
//

We influence 20 million users and is the number one business and technology news network on the planet

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

Loading
Sécurité Helvétique News | AmyrisSécurité Helvétique News | Amyris
Follow US
© 2023 Sécurité Helvétique NEWS par Amyris Sarl. Tous droits réservés
Amyris news letter
Join Us!

Subscribe to our newsletter and never miss our latest news, podcasts etc..

Loading
Zero spam, Unsubscribe at any time.
login Amyris SH
Welcome Back!

Sign in to your account

Lost your password?