VulnerabilitiesHIGH

Magento Vulnerability - Hackers Exploit PolyShell for RCE

CSCyber Security News
MagentoAdobe CommercePolyShellRCESansec
🎯

Basically, hackers found a way to upload harmful files to Magento stores and take control of accounts.

Quick Summary

A critical vulnerability in Magento allows hackers to execute remote code and take over accounts. This flaw, known as PolyShell, poses a serious risk to e-commerce platforms. Immediate action is necessary as no patch is currently available.

The Flaw

The PolyShell vulnerability is a critical unrestricted file upload flaw affecting Magento and Adobe Commerce stores. Discovered by the Sansec Forensics Team, this flaw allows unauthenticated attackers to execute remote code (RCE) and completely take over accounts. The vulnerability exists mainly due to the lack of essential security checks in the Magento REST API, particularly in the anonymous guest cart routes. This oversight enables attackers to bypass authentication entirely.

When a product option is set to accept files, Magento processes base64-encoded file data and writes it directly to the server’s pub/media/custom_options/quote/ directory. Unfortunately, the system fails to validate the submitted option ID against the product’s actual options, allowing attackers to upload malicious files without restrictions. The absence of file extension restrictions means that executable files like .php and .phar can be uploaded, making this vulnerability particularly dangerous.

What's at Risk

Since mid-March 2026, hackers have been conducting mass automated attacks against vulnerable e-commerce platforms. Sansec observed over 50 IP addresses targeting approximately 23% of protected stores. The attackers deploy polyglot files, which are valid image files containing hidden executable PHP code. This allows them to execute commands on compromised servers, leading to complete account takeover.

The vulnerable code has existed since the first release of Magento 2, affecting all versions of Magento Open Source and Adobe Commerce up to 2.4.9-alpha2. Stored cross-site scripting (XSS) vulnerabilities also affect all versions before 2.3.5. The risk of remote code execution varies based on server configurations, particularly affecting default Nginx and Apache setups.

Patch Status

Currently, there is no official patch available for production environments. Adobe has addressed the issue in the pre-release 2.4.9-alpha3 branch, but this does not help those using earlier versions. The lack of a timely patch puts many organizations at significant risk, as attackers continue to exploit this vulnerability with increasing frequency.

Administrators are urged to take immediate action to mitigate risks. Implementing a Web Application Firewall (WAF) can help block exploitation attempts in real-time. Additionally, restricting access to the pub/media/custom_options/ directory is crucial for preventing unauthorized file uploads.

Immediate Actions

Organizations should prioritize securing their Magento installations against this vulnerability. Here are some recommended actions:

  • Deploy a Web Application Firewall (WAF) to monitor and block suspicious activities.
  • Restrict web server access to the pub/media/custom_options/ directory.
  • For Nginx, configure a location block with a deny-all directive, while Apache users should enforce strict .htaccess rules.
  • Regularly scan environments for hidden webshells to detect potential compromises.

Taking these steps can significantly reduce the risk of exploitation until an official patch is released. Security teams must remain vigilant and proactive to safeguard their systems against this critical vulnerability.

🔒 Pro insight: The PolyShell vulnerability exemplifies a growing trend in e-commerce exploits, emphasizing the need for robust security measures in web applications.

Original article from

Cyber Security News · Abinaya

Read Full Article

Related Pings

HIGHVulnerabilities

TP-Link Vulnerabilities - Attackers Can Execute Commands Remotely

TP-Link has issued a critical advisory due to multiple vulnerabilities in its Archer NX routers. Attackers can exploit these flaws to execute commands remotely, jeopardizing network security. Immediate firmware updates are essential to protect against potential intrusions.

Cyber Security News·
HIGHVulnerabilities

TP-Link Vulnerability - Critical Router Auth Bypass Flaw

TP-Link has patched a critical flaw in its Archer NX routers that could allow unauthorized access. Users are urged to update their firmware to avoid potential risks. Ignoring this could lead to serious security breaches.

BleepingComputer·
HIGHVulnerabilities

Microsoft Authenticator - Khaled Mohamed Discovers Flaw

Khaled Mohamed discovered a critical flaw in Microsoft Authenticator, risking user accounts. This highlights the importance of bug bounty programs and responsible disclosure.

Malwarebytes Labs·
CRITICALVulnerabilities

ClawHub Vulnerability - Attackers Manipulate Skill Rankings

A critical vulnerability in ClawHub allowed attackers to inflate download counts of malicious skills. This flaw poses significant risks to users and AI agents. Silverfort has released a fix and a new security plugin to prevent future exploits.

Cyber Security News·
CRITICALVulnerabilities

Critical Vulnerability in SharePoint - Exploitation Alert

A critical vulnerability in Microsoft SharePoint has been exploited, allowing unauthenticated attackers to execute code. Organizations using affected versions must update immediately to safeguard their systems. This flaw poses a serious risk to data security and operational integrity.

CERT-EU Security Advisories·
HIGHVulnerabilities

Vulnerabilities in Security Stack - Major Endpoint Issues Uncovered

What Happened A recent report from Absolute Security reveals a troubling reality in enterprise cybersecurity. On any given day, one in five enterprise endpoints operates outside a protected and enforceable state. This statistic, drawn from the 2026 Resilience Risk Index, shows that despite organizations investing heavily in security tools, the situation has barely improved over the past year. The

Help Net Security·