Cyber Posture

CVE-2025-24412

High

Published: 11 February 2025

Published
11 February 2025
Modified
16 April 2025
KEV Added
Patch
CVSS Score 8.7 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N
EPSS Score 0.0132 80.0th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may take advantage of security vulnerabilities and inherent functionality in browser software to change content, modify user-behaviors, and intercept information as part of various browser session hijacking techniques.

Security Summary

CVE-2025-24412 is a stored Cross-Site Scripting (XSS) vulnerability, classified under CWE-79, affecting Adobe Commerce versions 2.4.8-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11, and earlier. The flaw resides in vulnerable form fields that fail to properly sanitize user input, enabling the injection of malicious JavaScript. Published on 2025-02-11, it carries a CVSS v3.1 base score of 8.7 (AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N), reflecting high severity due to its network accessibility and cross-origin scope.

A low-privileged attacker with access to the platform can exploit this by submitting malicious scripts through affected form fields. When a victim browses to the page containing the injected content, the JavaScript executes in their browser context, potentially enabling session takeover. This escalates impacts on confidentiality and integrity to high levels, as the attacker could steal session cookies, impersonate users, or perform unauthorized actions on their behalf.

Adobe's security bulletin APSB25-08 addresses this issue for Magento (Adobe Commerce), with full details and recommended mitigations available at https://helpx.adobe.com/security/products/magento/apsb25-08.html.

Details

CWE(s)
CWE-79

Affected Products

adobe
commerce
2.4.4, 2.4.5, 2.4.6, 2.4.7, 2.4.8 · ≤ 2.4.4
adobe
commerce b2b
1.3.3, 1.3.4, 1.3.5, 1.4.2, 1.5.0 · ≤ 1.3.3
adobe
magento
2.4.4, 2.4.5, 2.4.6, 2.4.7, 2.4.8 · ≤ 2.4.4

MITRE ATT&CK Enterprise Techniques

T1185 Browser Session Hijacking Collection
Adversaries may take advantage of security vulnerabilities and inherent functionality in browser software to change content, modify user-behaviors, and intercept information as part of various browser session hijacking techniques.
Why these techniques?

Stored XSS vulnerability allows injection and execution of malicious JavaScript in the victim's browser, directly enabling browser session hijacking via cookie theft or user impersonation.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References