Blog

Magento & Adobe Commerce Facing Major Attack Surge: SessionReaper

Benjamin Hosack
5 days ago
2 min read

Tags:

eCommerce
Magento
Web Security
ree

Magento 2 and Adobe Commerce users are currently dealing with a critical security crisis: the SessionReaper vulnerability (CVE-2025-54236) has triggered a rapid surge in malware attacks, jumping 47% in recent weeks[1][5].

What Is SessionReaper?

SessionReaper is a remote code execution flaw that lets attackers hijack user sessions and even seize full control of a store’s server - often without any authentication[1][5]. Exploitation typically involves uploading malicious session files, which can lead to stolen data, fraudulent transactions, and long-term backdoors in your shop’s codebase[1][5].

Scale of the Threat

  • More than 250 Magento stores were hit within 24 hours of exploit details becoming public[5][1].
  • Over 60% of Magento sites remain unpatched over a month after the fix[5][1].
  • Attackers prey on both Magento Open Source and Adobe Commerce, focusing on sites slow to update[1].

What Should Merchants Do?

  • Check your site now using ThreatView.  
  • This is a free scanner that will check your site from an external perspective. ThreatView Advanced Edition will provide you with comprehensive Filesystem and Database threat detection.
  • Apply the latest Adobe patch immediately to block ongoing attacks[1].
  • Remove suspicious session files and check for hidden backdoors even if you’ve already patched.

The attacks are accelerating - proactive patching and scanning are crucial to protect your customers and your business[1][5].

Sources

[1] Thousands of online stores at risk as SessionReaper ... https://www.malwarebytes.com/blog/news/2025/10/thousands-of-online-stores-at-risk-as-sessionreaper-attacks-spread

[2] Critical Adobe Commerce, Magento vulnerability under ... https://www.helpnetsecurity.com/2025/10/23/adobe-magento-cve-2025-54236-attack/

[3] Adobe Security Bulletin https://helpx.adobe.com/security/products/magento/apsb25-88.html

[4] SessionReaper: Account Takeover and Unauthenticated ... https://www.greenbone.net/en/blog/sessionreaper-account-takeover-and-unauthenticated-rce-in-magento-and-adobe-commerce/

[5] Over 250 Magento Stores Hit Overnight as Hackers Exploit ... https://thehackernews.com/2025/10/over-250-magento-stores-hit-overnight.html

[6] SessionReaper (CVE-2025-54236): Critical Adobe ... https://socradar.io/sessionreaper-cve-2025-54236-adobe-commerce-exploit/

[7] Adobe Commerce / Magento Insecure Deserialization ... https://www.tenable.com/plugins/was/115019

[8] Why nested deserialization is STILL harmful – Magento ...

Read Other Blog Articles

PolyShell and Magento: what merchants should do now

Turaco Labs
25 March 2026
4 mins
eCommerce
Magento
Malware
Web Security

A practical guide for Magento and Adobe Commerce merchants dealing with PolyShell: what it is, how to detect compromise, how ThreatView helps, and what to do next.

PrestaShop Under Attack: What We're Seeing and How to Protect Your Store

Turaco Labs
March 3, 2026
3 mins
eCommerce
Malware
Web Security

At Turaco Labs, our ThreatView telemetry has detected a concerning spike in compromised PrestaShop websites. As of this morning, we have identified 327 hacked sites actively running payload loaders or digital skimmer malware.

PrestaShop Security Alert: Protect Your Store from Digital Skimmers

Turaco Labs
February 12, 2026
3 mins
eCommerce
Magento

PrestaShop has recently issued a security alert warning store owners about a digital skimmer threat targeting their platform. If you're running a PrestaShop store, this is an important reminder to verify your site's security.

Proudly, designed, developed and maintained by Tecbot.