VYPR
Moderate severityNVD Advisory· Published Apr 8, 2025· Updated May 1, 2025

Adobe Commerce | Incorrect Authorization (CWE-863)

CVE-2025-27188

Description

Adobe Commerce versions 2.4.7-p4, 2.4.6-p9, 2.4.5-p11, 2.4.4-p12, 2.4.8-beta2 and earlier are affected by an Improper Authorization vulnerability that could result in Privilege escalation. An attacker could leverage this vulnerability to bypass security measures and gain unauthorized access. Exploitation of this issue does not require user interaction.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Adobe Commerce is vulnerable to an improper authorization flaw that allows privilege escalation without user interaction, affecting multiple versions.

Vulnerability

Overview

Adobe Commerce versions 2.4.7-p4, 2.4.6-p9, 2.4.5-p11, 2.4.4-p12, 2.4.8-beta2 and earlier are affected by an Improper Authorization vulnerability (CVE-2025-27188). This flaw arises from insufficient access control checks, enabling an attacker to bypass security measures and escalate privileges. The vulnerability can be exploited remotely without any user interaction, increasing its risk profile. [1]

Exploitation

Prerequisites

An attacker does not need to authenticate or rely on any user action to exploit this flaw. The vulnerability resides in the authorization logic, allowing unauthenticated requests to trigger privilege escalation. The attack surface is network-accessible, making it particularly dangerous for internet-facing deployments. [1]

Impact

Successful exploitation allows an attacker to gain unauthorized access and elevate their privileges within the application. This could lead to full administrative control over an Adobe Commerce instance, potentially exposing sensitive customer data, order information, and allowing modification of site configurations. [1]

Mitigation

Adobe has not yet released a patch for this vulnerability at the time of publication. However, the open-source Magento repository (from which Adobe Commerce derives) is available for security researchers to review and contribute fixes [2]. Users should monitor the Adobe Security Bulletin for updates and consider applying any provided patches or workarounds. Until a fix is available, limiting network exposure and implementing web application firewall rules may reduce risk.

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
magento/community-editionPackagist
< 2.4.4-p132.4.4-p13
magento/community-editionPackagist
>= 2.4.5-p1, < 2.4.5-p122.4.5-p12
magento/community-editionPackagist
>= 2.4.6-p1, < 2.4.6-p102.4.6-p10
magento/community-editionPackagist
>= 2.4.7-p1, < 2.4.7-p52.4.7-p5
magento/community-editionPackagist
>= 2.4.8-beta1, < 2.4.82.4.8

Affected products

3

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.