Cyber Posture

CVE-2025-24438

High

Published: 11 February 2025

Published
11 February 2025
Modified
27 February 2025
KEV Added
Patch
CVSS Score 8.7 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N
EPSS Score 0.0132 80.0th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may take advantage of security vulnerabilities and inherent functionality in browser software to change content, modify user-behaviors, and intercept information as part of various browser session hijacking techniques.

Security Summary

CVE-2025-24438 is a stored Cross-Site Scripting (XSS) vulnerability, classified under CWE-79, affecting Adobe Commerce versions 2.4.8-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11, and earlier. The flaw resides in vulnerable form fields that fail to properly sanitize or escape user input, allowing persistent injection of malicious JavaScript. Published on 2025-02-11, it carries a CVSS v3.1 base score of 8.7 (AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N), indicating high severity due to network accessibility, low attack complexity, and changed scope.

A low-privileged attacker with access to the platform can exploit this by submitting malicious payloads into the affected form fields. When a victim user subsequently views the page containing the injected content, the script executes in their browser context, bypassing same-origin policy restrictions. This enables session takeover, compromising the victim's authenticated session and leading to high confidentiality and integrity impacts, such as data theft or account hijacking.

The official Adobe Product Security Bulletin (APSB25-08) provides details on mitigation, available at https://helpx.adobe.com/security/products/magento/apsb25-08.html. Security practitioners should consult this advisory for patch information, upgrade paths, and any interim workarounds for affected Adobe Commerce deployments.

Details

CWE(s)
CWE-79

Affected Products

adobe
commerce
2.4.4, 2.4.5, 2.4.6, 2.4.7, 2.4.8
adobe
commerce b2b
1.3.3, 1.3.4, 1.3.5, 1.4.2, 1.5.0
adobe
magento
2.4.4, 2.4.5, 2.4.6, 2.4.7, 2.4.8

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1185 Browser Session Hijacking Collection
Adversaries may take advantage of security vulnerabilities and inherent functionality in browser software to change content, modify user-behaviors, and intercept information as part of various browser session hijacking techniques.
Why these techniques?

Stored XSS in public-facing web app enables exploitation via T1190; directly facilitates browser session hijacking (T1185) for session takeover as described.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References