支持本站 — 捐款将帮助我们持续运营

目标:1000 元,已筹:752

75.2%

POC详情: d3db9e4c74972eca385e043f88446c909fcab80e

来源
关联漏洞
标题:Adobe Commerce 安全漏洞 (CVE-2025-54236)
描述:Adobe Commerce是美国奥多比(Adobe)公司的一种面向商家和品牌的全球领先的数字商务解决方案。 Adobe Commerce存在安全漏洞,该漏洞源于输入验证不当,可能导致会话劫持。以下版本受到影响:2.4.9-alpha2版本、2.4.8-p2版本、2.4.7-p7版本、2.4.6-p12版本、2.4.5-p14版本和2.4.4-p15及之前版本。
描述
Patch for CVE-2025-54236(a.k.a Session Reaper) which allows customer account takeover and RCE under certain conditions. This patch is actually a Magento 2 extension and universal compatible for Magento 2.3 & 2.4. If you cannot upgrade Magento or cannot apply the official hotfix, try this one.
介绍
# Magento 2 Session Reaper Patch for CVE-2025-54236

**Patch for CVE-2025-54236(a.k.a Session Reaper) which allows customer account takeover and RCE under certain conditions. This patch is actually a Magento 2 extension and universal compatible for Magento 2.3 & 2.4. If you cannot upgrade Magento or cannot apply the official hotfix, try this one.**

## Background

### CVSS score

**9.1 CRITICAL**

### Official information

 - [Published on 2025-09-09](https://helpx.adobe.com/security/products/magento/apsb25-88.html)
 - [Hotfix](https://experienceleague.adobe.com/en/docs/experience-cloud-kcs/kbarticles/ka-27397)

### What can the attacker damage your store?

 - Customer account takeover
 - RCE under certain conditions

## Feature

 - Fixes CVE-2025-54236(a.k.a Session Reaper) vulnerability

#### Compatibility

*No `preference` is used, so your Magento is still upgradable.*

#### Behavior difference

*The official fix still allows dangerous parameter to go to `Setter`s, this patch does not allow it.*

## Requirements

Magento/Adobe Commerce 2.3 or 2.4

## Installation

```bash 
composer require wubinworks/module-session-reaper-patch
```

## ♥

If you like this extension or this extension helped you, please _**share**_ and _**★star☆**_ [this repository](https://github.com/wubinworks/magento2-session-reaper-patch), it's not hard!

### You may also like these extensions

#### Security

 - [Magento 2 Cosmic Sting Patch for CVE-2024-34102](https://github.com/wubinworks/magento2-cosmic-sting-patch "Magento 2 Cosmic Sting Patch for CVE-2024-34102")
 - [Magento 2 Trojan Orders Patch for CVE-2022-24086, CVE-2022-24087](https://github.com/wubinworks/magento2-template-filter-patch "Magento 2 Trojan Orders Patch for CVE-2022-24086, CVE-2022-24087")
 - [Magento 2 Enhanced XML Security](https://github.com/wubinworks/magento2-enhanced-xml-security "Magento 2 Enhanced XML Security")
 - [Magento 2 Encryption Key Manager CLI](https://github.com/wubinworks/magento2-encryption-key-manager-cli "Magento 2 Encryption Key Manager CLI")
 - [Magento 2 JWT Authentication Patch](https://github.com/wubinworks/magento2-jwt-auth-patch "Magento 2 JWT Authentication Patch")

#### Feature

 - [Magento 2 Free Sitemap Based Cache Warmer Extension](https://github.com/wubinworks/magento2-free-cache-warmer "Magento 2 Free Sitemap Based Cache Warmer Extension")
 - [Magento 2 Disable Customer Extension](https://github.com/wubinworks/magento2-disable-customer "Magento 2 Disable Customer Extension")
 - [Magento 2 Disable Customer Change Email Extension](https://github.com/wubinworks/disable-change-email "Magento 2 Disable Customer Change Email Extension")
 - [Magento 2 Price Formatter Extension](https://github.com/wubinworks/magento2-price-formatter "Magento 2 Price Formatter Extension")
文件快照

[4.0K] /data/pocs/d3db9e4c74972eca385e043f88446c909fcab80e ├── [1.4K] composer.json ├── [ 253] COPYING.txt ├── [4.0K] etc │   ├── [ 550] di.xml │   └── [ 388] module.xml ├── [10.0K] LICENSE.txt ├── [4.0K] Plugin │   └── [4.0K] Framework │   └── [4.0K] Webapi │   └── [4.3K] ServiceInputProcessor.php ├── [2.7K] README.md ├── [ 256] registration.php └── [ 350] SECURITY.md 5 directories, 9 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。