Description

An aggressive mass exploitation campaign targeting the critical SessionReaper vulnerability (CVE-2025-54236) in Adobe Commerce and Magento Open Source has compromised 200+ e-commerce sites globally, allowing attackers to hijack sessions and obtain elevated access on unpatched stores. The flaw’s severity and widespread lack of patch adoption have made it a prime target for automated attacks, resulting in extensive breaches and persistent backdoors. SessionReaper (CVE-2025-54236) is a critical improper input validation flaw in Magento’s REST API session handling and authentication logic, carrying a CVSS score of 9.1/10. It arises when session tokens aren’t properly invalidated or sanitized, enabling attackers to replay or manipulate session tokens to bypass authentication and take over accounts. Under certain configurations especially where file-based session storage is used this may also lead to unauthenticated remote code execution (RCE), allowing arbitrary commands to be executed on the server. Despite an out-of-cycle emergency patch released by Adobe in September 2025, a large portion of Magento installations remain unpatched, leaving them vulnerable to rapid exploitation. Automated scanning and exploitation scripts have probed thousands of endpoints, with over 250 attacks detected against sites attempting to deploy web shells, exfiltrate data, or install persistent backdoors.