VYPR
Moderate severityNVD Advisory· Published Oct 10, 2024· Updated Oct 10, 2024

Adobe Commerce | Improper Access Control (CWE-284)

CVE-2024-45135

Description

Adobe Commerce versions 2.4.7-p2, 2.4.6-p7, 2.4.5-p9, 2.4.4-p10 and earlier are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. An admin attacker could leverage this vulnerability to bypass security measures and have a low impact on integrity. Exploitation of this issue does not require user interaction.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Adobe Commerce is affected by an improper access control vulnerability that lets an admin attacker bypass security measures, with low integrity impact and no user interaction required.

Vulnerability

Overview

CVE-2024-45135 is an Improper Access Control vulnerability in Adobe Commerce versions 2.4.7-p2, 2.4.6-p7, 2.4.5-p9, 2.4.4-p10 and earlier [1]. The root cause is insufficient enforcement of access controls on certain administrative actions, allowing an attacker with admin privileges to bypass intended security measures [1].

Exploitation

An attacker who already has administrative access to an Adobe Commerce instance can exploit this flaw without any user interaction [1]. The attack vector does not require tricking a higher-privileged user; the attacker simply leverages their existing admin role to perform unauthorized operations that the access control policy was designed to prevent [1].

Impact

Successful exploitation results in a low impact on integrity [1]. The attacker may be able to modify configuration settings, templates, or other administrative resources that should be protected by additional access restrictions [1]. This could lead to unauthorized changes in the store's behavior or appearance, though the low integrity rating suggests the scope of manipulation is limited.

Mitigation

Adobe has released security updates to address this vulnerability in the affected versions: 2.4.7-p2, 2.4.6-p7, 2.4.5-p9, and 2.4.4-p10 [1]. Merchants are strongly advised to upgrade to the latest patched versions. The open-source Magento project provides the codebase on GitHub [2], and administrators should apply the updates as soon as possible.

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
magento/community-editionPackagist
>= 2.4.7-beta1, < 2.4.7-p32.4.7-p3
magento/community-editionPackagist
>= 2.4.6-p1, < 2.4.6-p82.4.6-p8
magento/community-editionPackagist
>= 2.4.5-p1, < 2.4.5-p102.4.5-p10
magento/community-editionPackagist
< 2.4.4-p112.4.4-p11

Affected products

3

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.