CVE-2025-54236
Adobe Commerce versions 2.4.9-alpha2, 2.4.8-p2, 2.4.7-p7, 2.4.6-p12, 2.4.5-p14, 2.4.4-p15 and

Publication date: 2025-09-09

Last updated on: 2025-11-07

Assigner: [email protected]

Description
Adobe Commerce versions 2.4.9-alpha2, 2.4.8-p2, 2.4.7-p7, 2.4.6-p12, 2.4.5-p14, 2.4.4-p15 and earlier are affected by an Improper Input Validation vulnerability. A successful attacker can abuse this to achieve session takeover, increasing the confidentiality, and integrity impact to high. Exploitation of this issue does not require user interaction.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Affected Vendors & Products
Vendor Product Version
adobe commerce 2.4.4
adobe commerce 2.4.4
adobe commerce 2.4.4
adobe commerce 2.4.4
adobe commerce 2.4.4
adobe commerce 2.4.4
adobe commerce 2.4.4
adobe commerce 2.4.4
adobe commerce 2.4.4
adobe commerce 2.4.4
adobe commerce 2.4.4
adobe commerce 2.4.4
adobe commerce 2.4.4
adobe commerce 2.4.4
adobe commerce 2.4.4
adobe commerce 2.4.4
adobe commerce 2.4.5
adobe commerce 2.4.5
adobe commerce 2.4.5
adobe commerce 2.4.5
adobe commerce 2.4.5
adobe commerce 2.4.5
adobe commerce 2.4.5
adobe commerce 2.4.5
adobe commerce 2.4.5
adobe commerce 2.4.5
adobe commerce 2.4.5
adobe commerce 2.4.5
adobe commerce 2.4.5
adobe commerce 2.4.5
adobe commerce 2.4.5
adobe commerce 2.4.6
adobe commerce 2.4.6
adobe commerce 2.4.6
adobe commerce 2.4.6
adobe commerce 2.4.6
adobe commerce 2.4.6
adobe commerce 2.4.6
adobe commerce 2.4.6
adobe commerce 2.4.6
adobe commerce 2.4.6
adobe commerce 2.4.6
adobe commerce 2.4.6
adobe commerce 2.4.6
adobe commerce 2.4.7
adobe commerce 2.4.7
adobe commerce 2.4.7
adobe commerce 2.4.7
adobe commerce 2.4.7
adobe commerce 2.4.7
adobe commerce 2.4.7
adobe commerce 2.4.7
adobe commerce 2.4.7
adobe commerce 2.4.7
adobe commerce 2.4.7
adobe commerce 2.4.8
adobe commerce 2.4.8
adobe commerce 2.4.8
adobe commerce 2.4.8
adobe commerce 2.4.8
adobe commerce 2.4.9
adobe commerce 2.4.9
adobe commerce_b2b 1.3.3
adobe commerce_b2b 1.3.3
adobe commerce_b2b 1.3.3
adobe commerce_b2b 1.3.3
adobe commerce_b2b 1.3.3
adobe commerce_b2b 1.3.3
adobe commerce_b2b 1.3.3
adobe commerce_b2b 1.3.3
adobe commerce_b2b 1.3.3
adobe commerce_b2b 1.3.3
adobe commerce_b2b 1.3.3
adobe commerce_b2b 1.3.3
adobe commerce_b2b 1.3.3
adobe commerce_b2b 1.3.3
adobe commerce_b2b 1.3.3
adobe commerce_b2b 1.3.3
adobe commerce_b2b 1.3.4
adobe commerce_b2b 1.3.4
adobe commerce_b2b 1.3.4
adobe commerce_b2b 1.3.4
adobe commerce_b2b 1.3.4
adobe commerce_b2b 1.3.4
adobe commerce_b2b 1.3.4
adobe commerce_b2b 1.3.4
adobe commerce_b2b 1.3.4
adobe commerce_b2b 1.3.4
adobe commerce_b2b 1.3.4
adobe commerce_b2b 1.3.4
adobe commerce_b2b 1.3.4
adobe commerce_b2b 1.3.4
adobe commerce_b2b 1.3.4
adobe commerce_b2b 1.4.2
adobe commerce_b2b 1.4.2
adobe commerce_b2b 1.4.2
adobe commerce_b2b 1.4.2
adobe commerce_b2b 1.4.2
adobe commerce_b2b 1.4.2
adobe commerce_b2b 1.4.2
adobe commerce_b2b 1.4.2
adobe commerce_b2b 1.5.2
adobe commerce_b2b 1.5.2
adobe commerce_b2b 1.5.2
adobe commerce_b2b 1.5.3
adobe commerce_b2b 1.5.3
adobe magento 2.4.5
adobe magento 2.4.5
adobe magento 2.4.5
adobe magento 2.4.5
adobe magento 2.4.5
adobe magento 2.4.5
adobe magento 2.4.5
adobe magento 2.4.5
adobe magento 2.4.5
adobe magento 2.4.5
adobe magento 2.4.5
adobe magento 2.4.5
adobe magento 2.4.5
adobe magento 2.4.5
adobe magento 2.4.5
adobe magento 2.4.6
adobe magento 2.4.6
adobe magento 2.4.6
adobe magento 2.4.6
adobe magento 2.4.6
adobe magento 2.4.6
adobe magento 2.4.6
adobe magento 2.4.6
adobe magento 2.4.6
adobe magento 2.4.6
adobe magento 2.4.6
adobe magento 2.4.6
adobe magento 2.4.6
adobe magento 2.4.7
adobe magento 2.4.7
adobe magento 2.4.7
adobe magento 2.4.7
adobe magento 2.4.7
adobe magento 2.4.7
adobe magento 2.4.7
adobe magento 2.4.7
adobe magento 2.4.7
adobe magento 2.4.7
adobe magento 2.4.7
adobe magento 2.4.8
adobe magento 2.4.8
adobe magento 2.4.8
adobe magento 2.4.8
adobe magento 2.4.8
adobe magento 2.4.9
adobe magento 2.4.9
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-20 The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?


How can this vulnerability impact me? :


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart
Meta Information
CVE Publication Date:
2025-09-09
CVE Last Modified Date:
2025-11-07
Report Generation Date:
2025-11-07
AI Powered Q&A Generation:
2025-09-09
EPSS Last Evaluated Date:
2025-09-14
NVD Report Link: