CVE-2025-24412
Published: 11 February 2025
Summary
CVE-2025-24412 is a high-severity Cross-site Scripting (CWE-79) vulnerability in Adobe Commerce. Its CVSS base score is 8.7 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Browser Session Hijacking (T1185); ranked in the top 20.0% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-15 (Information Output Filtering).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
SI-10 requires validation of user inputs to vulnerable form fields, directly preventing the storage of malicious scripts in Adobe Commerce.
SI-15 mandates filtering of information outputs from affected fields, blocking execution of injected JavaScript in victims' browsers.
SI-2 ensures timely remediation of the specific flaw in Adobe Commerce versions through patching as recommended in APSB25-08.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Stored XSS vulnerability allows injection and execution of malicious JavaScript in the victim's browser, directly enabling browser session hijacking via cookie theft or user impersonation.
NVD Description
Adobe Commerce versions 2.4.8-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed…
more
in a victim’s browser when they browse to the page containing the vulnerable field. A successful attacker can abuse this to achieve session takeover, increasing the confidentiality and integrity impact as high.
Deeper analysisAI
CVE-2025-24412 is a stored Cross-Site Scripting (XSS) vulnerability, classified under CWE-79, affecting Adobe Commerce versions 2.4.8-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11, and earlier. The flaw resides in vulnerable form fields that fail to properly sanitize user input, enabling the injection of malicious JavaScript. Published on 2025-02-11, it carries a CVSS v3.1 base score of 8.7 (AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N), reflecting high severity due to its network accessibility and cross-origin scope.
A low-privileged attacker with access to the platform can exploit this by submitting malicious scripts through affected form fields. When a victim browses to the page containing the injected content, the JavaScript executes in their browser context, potentially enabling session takeover. This escalates impacts on confidentiality and integrity to high levels, as the attacker could steal session cookies, impersonate users, or perform unauthorized actions on their behalf.
Adobe's security bulletin APSB25-08 addresses this issue for Magento (Adobe Commerce), with full details and recommended mitigations available at https://helpx.adobe.com/security/products/magento/apsb25-08.html.
Details
- CWE(s)