An aggressive mass exploitation campaign targeting the critical SessionReaper vulnerability (CVE-2025-54236) in Adobe Commerce and Magento Open Source has compromised 200+ e-commerce sites globally, allowing attackers to hijack sessions and obtain elevated access on unpatched stores. The flaw’s severity and widespread lack of patch adoption have made it a prime target for automated attacks, resulting in extensive breaches and persistent backdoors. SessionReaper (CVE-2025-54236) is a critical improper input validation flaw in Magento’s REST API session handling and authentication logic, carrying a CVSS score of 9.1/10. It arises when session tokens aren’t properly invalidated or sanitized, enabling attackers to replay or manipulate session tokens to bypass authentication and take over accounts. Under certain configurations especially where file-based session storage is used this may also lead to unauthenticated remote code execution (RCE), allowing arbitrary commands to be executed on the server. Despite an out-of-cycle emergency patch released by Adobe in September 2025, a large portion of Magento installations remain unpatched, leaving them vulnerable to rapid exploitation. Automated scanning and exploitation scripts have probed thousands of endpoints, with over 250 attacks detected against sites attempting to deploy web shells, exfiltrate data, or install persistent backdoors.
A high-severity security vulnerability has been disclosed in OpenClaw (formerly Clawdbot/Moltbot) that enables remote code execution (RCE) through a single malicious link. Tracked ...
A newly formed Russian hacker alliance calling itself Russian Legion has launched a coordinated cyberattack campaign against Denmark, marking a notable escalation in state-aligned ...
Fraudulent High-Yield Investment Programs (HYIPs) are rapidly spreading worldwide, promising “assured” profits that no genuine investment model can realistically deliver. These...