SessionReaper Strikes: Adobe Commerce Users Scramble to Patch Critical Vulnerability!

SessionReaper (CVE-2025-54236) is wreaking havoc on Adobe Commerce, with hackers exploiting it like it’s a cyber buffet. Six weeks post-patch, hundreds of attempts are recorded, yet 62% of online stores remain vulnerable. It’s a digital Wild West out there—time for website admins to patch up or face the code-slingers!

Pro Dashboard

Hot Take:

Well, it seems like Adobe Commerce is having a bit of an identity crisis—it’s gone from being a shopping haven to a hacker’s playground faster than you can say “SessionReaper.” Someone should tell them this is not what they meant by “customer engagement.”

Key Points:

  • Hackers are exploiting the SessionReaper vulnerability in Adobe Commerce.
  • The flaw allows attackers to hijack account sessions without user interaction.
  • Sansec has detected and blocked over 250 exploitation attempts in a single day.
  • A technical analysis by Searchlight Cyber could fuel further exploitation.
  • 62% of Magento stores are still vulnerable due to not applying the patch.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?