Adobe Commerce | Cross-site Scripting (Stored XSS) (CWE-79)
Description
Adobe Commerce versions 2.4.9-alpha2, 2.4.8-p2, 2.4.7-p7, 2.4.6-p12, 2.4.5-p14, 2.4.4-p15 and earlier are affected by a stored Cross-Site Scripting (XSS) Cross-Site Scripting (XSS) vulnerability that could be abused by a high-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. A successful attacker can abuse this to achieve session takeover, increasing the confidentiality, and integrity impact to high. Exploitation of this issue requires user interaction in that a victim must browse to the page containing the vulnerable field. Scope is changed.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Adobe Commerce (and Magento Open Source) versions up to 2.4.4-p15, 2.4.5-p14, 2.4.6-p12, 2.4.7-p7, and 2.4.8-p2 are vulnerable to stored XSS via form fields, exploitable by high-privileged attackers to achieve session takeover.
Root
Cause
CVE-2025-54264 is a stored Cross-Site Scripting (XSS) vulnerability in Adobe Commerce (and related Magento Open Source) affecting the listed versions. The issue originates from insufficient sanitization of form fields, allowing a high-privileged attacker to inject arbitrary JavaScript into the application's data store. This is a classic XSS flaw where the injected script is persisted on the server and served to other users [1][2].
Exploitation
The attack requires an authenticated user with high privileges (e.g., an admin or other powerful role) to inject the malicious script into a vulnerable form field. The attacker does not require any interaction from the victim at the moment of injection. However, for the impact to occur, a victim (a different user) must browse to the page that renders the vulnerable field. No additional privileges are needed on the victim's part; simply viewing the infected page triggers the payload in their browser [1].
Impact
Successful exploitation allows the attacker to execute arbitrary JavaScript in the victim's browser session. This can lead to session hijacking (session takeover), where the attacker can impersonate the victim and perform actions on their behalf, potentially including accessing sensitive data or performing administrative operations. The CVSS score reflects a high impact on confidentiality and integrity, and the scope is changed, meaning the vulnerability can affect resources beyond the original application's boundaries (e.g., the victim's other browser tabs) [1].
Mitigation
Adobe has released security updates that fix this vulnerability in the following versions: Adobe Commerce 2.4.9-alpha2, 2.4.8-p2, 2.4.7-p7, 2.4.6-p12, 2.4.5-p14, 2.4.4-p15, and later. Users should upgrade to these or newer versions. Adobe also recommends applying general security best practices, such as limiting admin privileges, as a defense-in-depth measure [1][2].
- NVD - CVE-2025-54264
- GitHub - magento/magento2: Prior to making any Submission(s), you must sign an Adobe Contributor License Agreement, available here at: https://opensource.adobe.com/cla.html. All Submissions you make to Adobe Inc. and its affiliates, assigns and subsidiaries (collectively “Adobe”) are subject to the terms of the Adobe Contributor License Agreement.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
magento/project-community-editionPackagist | <= 2.0.2 | — |
magento/community-editionPackagist | >= 2.4.9-alpha1, < 2.4.9-alpha3 | 2.4.9-alpha3 |
magento/community-editionPackagist | >= 2.4.8-beta1, < 2.4.8-p3 | 2.4.8-p3 |
magento/community-editionPackagist | >= 2.4.7-beta1, < 2.4.7-p8 | 2.4.7-p8 |
magento/community-editionPackagist | < 2.4.6-p13 | 2.4.6-p13 |
Affected products
2- Range: <=2.4.9-alpha2
- Adobe/Adobe Commercev5Range: 0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-2768-5wmv-cfffghsaADVISORY
- helpx.adobe.com/security/products/magento/apsb25-94.htmlghsavendor-advisoryWEB
- nvd.nist.gov/vuln/detail/CVE-2025-54264ghsaADVISORY
News mentions
0No linked articles in our index yet.