You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
"description": "This module exploits CVE-2025-54236 (SessionReaper), a critical vulnerability in\n Magento/Adobe Commerce that allows unauthenticated remote code execution.\n\n The vulnerability stems from improper handling of nested deserialization in the\n payment method context, combined with an unauthenticated file upload endpoint.\n\n The exploit chain consists of three steps:\n 1. Upload a malicious PHP session file containing a Guzzle/FW1 deserialization\n payload via the unauthenticated /customer/address_file/upload endpoint\n 2. Trigger deserialization by sending a crafted JSON payload to the REST API\n endpoint /rest/default/V1/guest-carts/{cart_id}/order that modifies the\n session savePath to point to the uploaded file\n 3. Execute the uploaded PHP code to gain remote code execution\n\n This vulnerability affects Magento 2.x instances configured to use file-based\n session storage. Patched versions will return a 400 Bad Request response instead\n of processing the malicious payload.",
0 commit comments