Fixed Intel
CRITICAL THREAT ALERT
Aggregated Intel
Critical
Industry NewsImpact: 92/10

Magento PolyShell Flaw Enables Unauthenticated Uploads, RCE and Account Takeover

Magento flaw allows unauthenticated file uploads up to 2.4.9-alpha2, enabling RCE or takeover, exposing stores to attack risk.

FIFixed Intel Team||2 min read|2 Views
Magento PolyShell Flaw Enables Unauthenticated Uploads, RCE and Account Takeover

AI-Generated Summary

A critical security flaw dubbed 'PolyShell' in Magento's REST API allows unauthenticated attackers to upload arbitrary executables disguised as images, potentially leading to remote code execution via PHP upload or account takeover via stored XSS. The vulnerability affects all Magento Open Source and Adobe Commerce versions up to 2.4.9-alpha2, exploiting the file upload mechanism in custom cart item options. Adobe has addressed the issue in the 2.4.9 pre-release branch under APSB25-94, but no isolated patch exists for current production versions.

Affected Sectors

E-CommerceRetailFinancial ServicesTechnology

Frameworks

NCA-ECCISO27001NIST CSFPCI-DSSNIST SP 800-53

Aggregated from The Hacker News

This article was automatically aggregated from an external source. Content may be summarized.

Read Original

Full Analysis

Ravie LakshmananMar 20, 2026Web Security / Vulnerability

Sansec is warning of a critical security flaw in Magento's REST API that could allow unauthenticated attackers to upload arbitrary executables and achieve code execution and account takeover.

The vulnerability has been codenamed PolyShell by Sansec owing to the fact that the attack hinges on disguising malicious code as an image. There is no evidence that the shortcoming has been exploited in the wild. The unrestricted file upload flaw affects all Magento Open Source and Adobe Commerce versions up to 2.4.9-alpha2.

The Dutch security firm said the problem stems from the fact that Magento's REST API accepts file uploads as part of the custom options for the cart item.

"When a product option has type 'file,' Magento processes an embedded file_info object containing base64-encoded file data, a MIME type, and a filename," it said. "The file is written to pub/media/custom_options/quote/ on the server."

Depending on the web server configuration, the flaw can enable remote code execution via PHP upload or account takeover via stored XSS.

Cybersecurity

Sansec also noted that Adobe fixed the issue in the 2.4.9 pre-release branch as part of APSB25-94, but leaves current production versions without an isolated patch.

"While Adobe provides a sample web server configuration that would largely limit the fallout, the majority of stores use a custom configuration from their hosting provider," it added.

To mitigate any potential risk, e-commerce storefronts are advised to perform the following steps -

  • Restrict access to the upload directory ("pub/media/custom_options/").
  • Verify that nginx or Apache rules prevent access to the directory.
  • Scan the stores for web shells, backdoors, and other malware.

"Blocking access does not block uploads, so people will still be able to upload malicious code if you aren't using a specialized WAF [Web Application Firewall]," Sansec said.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


Originally published by The Hacker News

Original Source

The Hacker News