Skip to main content
Mallory

Active Exploitation of SessionReaper Vulnerability in Adobe Magento

actively-exploited-vulnerabilityinternet-facing-service-vulnerabilityproof-of-concept-releaserapid-weaponizationwidely-deployed-product-advisory
Updated March 21, 2026 at 03:38 PM10 sources
Share:
Active Exploitation of SessionReaper Vulnerability in Adobe Magento

Get Ahead of Threats Like This

Know if you're exposed. Before adversaries strike.

Hackers have begun actively exploiting the critical SessionReaper vulnerability (CVE-2025-54236) in Adobe Commerce (Magento) platforms, with security firm Sansec detecting and blocking hundreds of real-world attack attempts. The flaw, which allows attackers to take control of account sessions via the Commerce REST API, remains unpatched in approximately 62% of Magento stores, leaving thousands of e-commerce sites exposed to remote code execution and account takeover attacks. Technical analyses and proof-of-concept exploit code have been published, further increasing the risk of mass exploitation.

Adobe issued an emergency patch for SessionReaper six weeks prior to the observed attacks, but patch adoption has been slow. Attackers are leveraging PHP webshells and probes to exploit the vulnerability, with most attacks originating from a handful of IP addresses. Security experts warn that the public availability of exploit details and the high impact of the flaw make rapid patching and the activation of web application firewalls critical for all affected organizations.

Timeline

  1. Oct 22, 2025

    Sansec warns most Magento stores remain unpatched

    Roughly six weeks after the patch, Sansec said only about 38% of Magento stores had patched, leaving about 62% still vulnerable. Researchers warned that low patch adoption and public exploit details could enable mass automated exploitation.

  2. Oct 22, 2025

    Adobe updates advisory to confirm in-the-wild exploitation

    After the patch release, Adobe later updated its security advisory to acknowledge that CVE-2025-54236 was being exploited in the wild. This update was referenced by later reporting on the active attacks.

  3. Oct 22, 2025

    Sansec detects over 250 SessionReaper exploitation attempts

    Sansec reported blocking more than 250 exploitation attempts against multiple Magento/Adobe Commerce stores in a single day, with payloads including PHP webshells and phpinfo probes from multiple IP addresses. The activity marked clear in-the-wild exploitation of CVE-2025-54236.

  4. Oct 22, 2025

    Technical analysis and PoC for SessionReaper are published

    Assetnote/Searchlight Cyber published a reverse-engineering-based technical analysis and proof-of-concept for SessionReaper, describing how the bug could lead to unauthenticated remote code execution in some configurations. Multiple sources say public exploit details increased the likelihood of rapid weaponization.

  5. Sep 9, 2025

    Adobe releases emergency patch for SessionReaper

    Adobe released a hotfix/emergency update for CVE-2025-54236 to address the SessionReaper flaw. Reports place the patch release on September 9, 2025.

  6. Sep 8, 2025

    Adobe discloses CVE-2025-54236 advisory

    Adobe publicly disclosed CVE-2025-54236, a critical improper input validation flaw in Adobe Commerce and Magento Open Source that can enable customer session takeover via the REST API. Multiple reports cite September 8, 2025 as the disclosure date.

  7. Sep 8, 2025

    Researcher responsibly discloses SessionReaper to Adobe

    Security researcher Blaklis responsibly disclosed the SessionReaper vulnerability, later tracked as CVE-2025-54236, to Adobe before public exploitation was reported. The disclosure prompted Adobe to prepare an emergency fix.

See the full picture in Mallory

Mallory subscribers get deeper analysis on every story, including:

Impact Assessment

Who’s affected and how

Technical Details

Deep-dive technical analysis

Response Recommendations

Actionable next steps for your team

Indicators of Compromise

IPs, domains, hashes, and more

AI Threads

Ask questions and take action on every story

Advanced Filters

Filter by topic, classification, timeframe

Scheduled Alerts

Get matching stories delivered automatically

Sources

October 24, 2025 at 12:00 AM

5 more from sources like the hacker news, help net security, dark reading, bleeping computer and sansec

Related Stories

Critical Magento SessionReaper Vulnerability (CVE-2025-54236) Enables Session Hijacking and Remote Code Execution

Critical Magento SessionReaper Vulnerability (CVE-2025-54236) Enables Session Hijacking and Remote Code Execution

A critical vulnerability in the Magento ecommerce platform, identified as CVE-2025-54236 and dubbed 'SessionReaper,' has been actively exploited in the wild. The flaw allows attackers to hijack user sessions and achieve unauthenticated remote code execution (RCE) on affected Magento installations. Security researchers observed a surge in exploitation attempts following the public release of a proof-of-concept (PoC) exploit, with attackers deploying web shells and conducting reconnaissance using classic PHP probes. Adobe released an emergency patch for the vulnerability, and organizations are urged to apply it immediately to mitigate risk. Magento's widespread use and history of critical vulnerabilities make this flaw particularly attractive to threat actors. Exploitation attempts have targeted over 130 hosts from multiple IP addresses within 48 hours of the PoC's publication. Web application firewalls, such as Akamai's Adaptive Security Engine, have been effective in mitigating some exploit attempts by default. The vulnerability's critical nature and active exploitation highlight the urgent need for patching and enhanced monitoring of Magento deployments.

1 months ago

Mass Exploitation of Magento SessionReaper (CVE-2025-54236) to Hijack Admin Sessions and Gain Root Access

Threat actors conducted a mass exploitation campaign against **Magento** e-commerce deployments by abusing **CVE-2025-54236** (aka **SessionReaper**), an authentication/session management flaw that allows attackers to bypass login controls by **reusing improperly invalidated session tokens**. Reporting based on an **Oasis Security** investigation described large-scale scanning that identified **1,000+ exposed/vulnerable Magento Commerce APIs** and confirmed compromises of **200+ websites** (with one count citing **216 victim sites**), indicating broad weaponization by multiple actors across regions. After hijacking valid admin sessions via replayed “zombie” tokens, intruders escalated privileges to achieve **root-level control** of affected Linux servers, enabling follow-on actions such as deploying **web shells** for persistent remote command execution and full administrative takeover of storefront infrastructure. Separately, research on **eSkimming/Magecart** activity highlighted that browser-based JavaScript payment-card theft remains persistent across e-commerce sites—often via third-party script/supply-chain compromise—and a longitudinal study of **550** previously compromised sites found **18%** still infected a year later, underscoring that e-commerce compromises frequently involve durable footholds and re-compromise even after initial cleanup.

1 months ago
Critical Adobe Commerce Session Hijack Flaw Added to KEV After Active Exploitation

Critical Adobe Commerce Session Hijack Flaw Added to KEV After Active Exploitation

Adobe released an out-of-band fix for **CVE-2025-54236**, a critical improper input validation flaw in **Adobe Commerce**, **Adobe Commerce B2B**, and **Magento Open Source** that allows unauthenticated attackers to take over user sessions through vulnerable session-handling and Web API components. The bug, dubbed **"SessionReaper"** by Sansec, carries a reported **CVSS 9.1** rating and can lead to account hijacking, exposure of customer data, fraudulent orders, administrative access, and in some scenarios potentially remote code execution. Affected releases span multiple 2.4.x branches, including versions from **2.4.4 through 2.4.7** and other listed builds and earlier releases. Security guidance escalated after reports said the flaw was being actively exploited in the wild and added to **CISA's Known Exploited Vulnerabilities** catalog. Adobe published remediation details in **APSB25-88** and shipped patched versions, while defenders were urged to apply the vendor fix immediately, verify patch status, review logs for anomalous session activity, tighten administrative access, and increase **WAF**, API, and **SIEM** monitoring. Advisories also warned that leaked hotfix details and unofficial fixes could accelerate attacker weaponization or create additional risk.

1 weeks ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed. Before adversaries strike.

Active Exploitation of SessionReaper Vulnerability in Adobe Magento | Mallory