The SessionReaper (CVE-2025-54236) vulnerability poses a critical security threat to both Adobe Commerce (including B2B) and Magento Open Source platforms. First discovered in September 2025, this improper input validation flaw allows unauthenticated attackers to hijack customer sessions and, under certain configurations, achieve remote code execution (RCE) through the Commerce REST API.
Despite Adobe’s emergency patch, 62% of Magento stores remain unpatched, and over 250 active attack attempts were recorded in just the last 24 hours. The exploit employs malicious session injection and nested deserialization, following a pattern similar to the previous CosmicSting incident. Security researchers warn of mass exploitation within 48 hours if unpatched systems persist.
The SessionReaper vulnerability allows attackers to seize control of user sessions without authentication via the Magento REST API. This zero-interaction attack grants full session hijacking and potential remote code execution under certain conditions, particularly when file-based session storage is used.
cpe:2.3:a:adobe:commerce:-:*:*:*:*:*:*:*cpe:2.3:a:adobe:commerce_b2b:-:*:*:*:*:*:*:*cpe:2.3:a:adobe:magento:-:*:*:open_source:*:*:*Attackers are leveraging publicly available exploit code, targeting unpatched systems through malicious session injections. These attacks are increasing rapidly, with exploitation campaigns now spreading globally across retail and e-commerce sectors.
Continuous Monitoring:
Monitor for anomalous session activity, unexpected API calls, and unauthorized configuration changes across Commerce instances.
| Type | Value |
|---|---|
| IPv4 | 34[.]227[.]25[.]4, 44[.]212[.]43[.]34, 54[.]205[.]171[.]35, 155[.]117[.]84[.]134, 159[.]89[.]12[.]166 |
| Tactic | Technique ID | Description |
|---|---|---|
| Initial Access | TA0001 | Exploit Public-Facing Application (T1190) |
| Execution | TA0002 | Command and Scripting Interpreter (T1059) |
| Persistence | TA0003 | Exploitation of Remote Services (T1210) |
| Defense Evasion | TA0005 | Obfuscated Files or Information (T1027), Exploitation for Defense Evasion (T1211) |
| Credential Access | – | Steal Web Session Cookie (T1539) |
| Command and Control | – | Web Protocols (T1071.001) |
Get through updates and upcoming events, and more directly in your inbox