VYPR
Moderate severityNVD Advisory· Published Jun 25, 2025· Updated Jun 25, 2025

Adobe Commerce | Incorrect Authorization (CWE-863)

CVE-2025-49550

Description

Adobe Commerce versions 2.4.8, 2.4.7-p5, 2.4.6-p10, 2.4.5-p12, 2.4.4-p13 and earlier are affected by an Incorrect Authorization vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to bypass security measures and gain limited unauthorized access. Exploitation of this issue requires user interaction.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Adobe Commerce versions 2.4.8, 2.4.7-p5, 2.4.6-p10, 2.4.5-p12, 2.4.4-p13 and earlier are affected by an Incorrect Authorization vulnerability that allows a limited security feature bypass through user interaction.

Vulnerability

Overview

CVE-2025-49550 is an Incorrect Authorization vulnerability affecting Adobe Commerce (including Magento Open Source) versions 2.4.8, 2.4.7-p5, 2.4.6-p10, 2.4.5-p12, 2.4.4-p13, and earlier. The root cause lies in improper enforcement of access controls, allowing an attacker to bypass intended security restrictions. This flaw is classified as a security feature bypass [1].

Exploitation

Exploitation of this vulnerability requires user interaction, meaning an attacker must convince a legitimate user to perform a specific action, such as clicking a malicious link or opening a crafted file. The attack vector is not fully detailed in the advisory, but the requirement for user interaction suggests a social engineering component. No special network access or authentication is described as necessary, though the attacker may need to be unauthenticated to craft the initial request [1].

Impact

A successful attack could lead to limited unauthorized access to affected systems. The vulnerability is rated with a CVSS v4.0 score, though the vector string and exact severity have not yet been provided by NVD. The impact is described as a security feature bypass, meaning the attacker may be able to circumvent protections like access control lists or permission checks to gain capabilities not intended for their user role [1].

Mitigation

Adobe has not yet released a patch for this vulnerability in the affected versions. Users are advised to monitor the Adobe Security Bulletin and the Magento Open Source repository for updates [2]. Until a patch is available, organizations should enforce strict user interaction policies, limit exposure of administrative interfaces, and apply general security best practices to reduce the risk of exploitation.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
magento/project-community-editionPackagist
<= 2.0.2
magento/community-editionPackagist
>= 2.4.7-beta1, < 2.4.7-p62.4.7-p6
magento/community-editionPackagist
>= 2.4.6-p1, < 2.4.6-p112.4.6-p11
magento/community-editionPackagist
< 2.4.5-p132.4.5-p13

Affected products

4

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.