CVE-2025-24429
Published:February 11, 2025
Updated:May 17, 2026
Adobe Commerce versions 2.4.8-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 and earlier are affected by an Improper Access Control vulnerability that could result in a Security feature bypass allowing read only access. A low-privileged attacker could leverage this vulnerability to bypass security measures and gain unauthorized access. Exploitation of this issue requires user interaction.
Affected Packages
magento/community-edition (PHP):
Affected version(s) >=2.4.7-beta1 <2.4.7-p4Fix Suggestion:
Update to version 2.4.7-p4magento/community-edition (PHP):
Affected version(s) >=2.4.5-p1 <2.4.5-p11Fix Suggestion:
Update to version 2.4.5-p11magento/community-edition (PHP):
Affected version(s) >=dev-AC-16717 <2.4.4-p12Fix Suggestion:
Update to version 2.4.4-p12magento/community-edition (PHP):
Affected version(s) >=2.4.6-p1 <2.4.6-p9Fix Suggestion:
Update to version 2.4.6-p9Related Resources (2)
Do you need more information?
Contact UsCVSS v4
Base Score:
5.1
Attack Vector
NETWORK
Attack Complexity
LOW
Attack Requirements
NONE
Privileges Required
LOW
User Interaction
PASSIVE
Vulnerable System Confidentiality
LOW
Vulnerable System Integrity
NONE
Vulnerable System Availability
NONE
Subsequent System Confidentiality
NONE
Subsequent System Integrity
NONE
Subsequent System Availability
NONE
CVSS v3
Base Score:
3.5
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality
LOW
Integrity
NONE
Availability
NONE
Weakness Type (CWE)
Improper Access Control
EPSS
Base Score:
0.18