A critical vulnerability in Adobe Commerce and Magento, tracked as CVE-2025-54236, is under active attack. The flaw, nicknamed 'SessionReaper,' allows an unauthenticated attacker to hijack administrator and user sessions without any user interaction. Attackers are exploiting this to deploy PHP web shells, granting them persistent access and full control over compromised e-commerce sites. On October 24, 2025, CISA added this vulnerability to its Known Exploited Vulnerabilities (KEV) catalog due to evidence of in-the-wild exploitation. With a large percentage of stores still vulnerable, there is a high risk of widespread compromise, data theft, and financial loss for online retailers.
CVE-2025-54236 is an improper input validation vulnerability affecting the REST API of Adobe Commerce and Magento. An unauthenticated attacker can send a specially crafted request to the API to hijack an existing, valid user session. The attack requires no privileges and no interaction from the targeted user, making it highly dangerous and easy to automate. The specific mechanism involves manipulating session validation logic, allowing the attacker to assume the identity and privileges of the hijacked session, which could include an administrator account.
The vulnerability impacts the following versions:
2.4.4-p15 and earlier2.4.9-alpha2 through 2.4.4-p15According to security researchers, over 60% of scanned Magento installations were found to be unpatched, indicating a vast attack surface.
The vulnerability is being actively exploited. Attackers have been observed using the session hijacking capability to gain administrative access to the backend of Magento stores. Once access is achieved, they deploy PHP web shells, a common tactic for establishing persistence (T1505.003 - Server Software Component: Web Shell). This allows the attacker to execute arbitrary commands on the server, steal customer data, install credit card skimmers, or deface the website. The inclusion in CISA's KEV catalog underscores the real-world threat and mandates that U.S. federal agencies patch by a specified deadline.
A successful exploit of CVE-2025-54236 can be catastrophic for an e-commerce business:
info.php, c99.php, r57.php) and use grep or similar tools to search for suspicious functions like eval(), base64_decode(), system(), or shell_exec() within your web root./api/) to only trusted IP addresses. This can be done at the web server (e.g., Nginx, Apache) or firewall level. This is a temporary compensating control and not a substitute for patching.Applying the security patches from Adobe is the only way to fully remediate the vulnerability.
Mapped D3FEND Techniques:
Restricting access to the API endpoints to only trusted IP addresses can serve as a strong compensating control.
Mapped D3FEND Techniques:
The immediate and highest-priority action for all Adobe Commerce and Magento administrators is to apply the security updates that address CVE-2025-54236. Given that over 60% of stores are reportedly vulnerable and active exploitation is confirmed, the risk of compromise is extremely high. Use the official Adobe Security Bulletin to identify the correct patch for your specific version. Before deploying to production, test the patch in a staging environment to ensure it doesn't disrupt store functionality. After patching, verify the update was successful using the command line or admin panel. This is not an optional update; it is an emergency remediation to prevent imminent compromise.
To detect if your Adobe Commerce or Magento store has already been compromised via CVE-2025-54236, a thorough file system analysis is required. Implement a File Integrity Monitoring (FIM) solution to alert on any new or modified files, particularly .php files, within your web directories. Manually scan your file system for common web shell indicators, searching for suspicious filenames and file content containing functions like eval, system, passthru, shell_exec, and base64_decode. Compare your current file system against a known-good backup or a fresh installation to identify unauthorized additions. A positive finding indicates a successful breach, and incident response procedures must be initiated immediately.
To detect active exploitation of 'SessionReaper,' security teams must analyze web and API logs for session anomalies. Establish a baseline of normal session activity for your Magento REST API. Hunt for indicators of hijacking, such as a session token suddenly being used from a completely different IP address or user-agent string, especially if the new IP geolocates to an unexpected country. Monitor for administrative actions (e.g., creating a new admin user, installing an extension) that originate from a session that was previously performing only low-privilege customer actions. These patterns are strong indicators that a session has been hijacked and is being abused by an attacker.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats