CVE-2025-24413
Published: 11 February 2025
Summary
CVE-2025-24413 is a high-severity Cross-site Scripting (CWE-79) vulnerability in Adobe Commerce. Its CVSS base score is 8.7 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Browser Session Hijacking (T1185); ranked in the top 20.0% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-15 (Information Output Filtering).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Requires filtering of outputs from vulnerable form fields to encode or escape injected scripts, preventing their execution in victims' browsers.
Mandates validation of inputs to vulnerable form fields, blocking malicious script injection by low-privileged attackers.
Ensures timely patching of the specific flaw in affected Adobe Commerce versions per vendor advisory, remediating the stored XSS vulnerability.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Stored XSS directly enables injection and execution of attacker-controlled JavaScript in the victim's browser, facilitating session takeover as described in the CVE.
NVD Description
Adobe Commerce versions 2.4.8-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed…
more
in a victim’s browser when they browse to the page containing the vulnerable field. A successful attacker can abuse this to achieve session takeover, increasing the confidentiality and integrity impact as high.
Deeper analysisAI
CVE-2025-24413 is a stored Cross-Site Scripting (XSS) vulnerability (CWE-79) affecting Adobe Commerce versions 2.4.8-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11, and earlier. Published on 2025-02-11, it carries a CVSS v3.1 base score of 8.7 (AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N), indicating high severity due to its network accessibility, low complexity, and potential for significant confidentiality and integrity impacts.
A low-privileged attacker can exploit the vulnerability by injecting malicious scripts into vulnerable form fields. When a victim browses to the page containing the injected content, the malicious JavaScript executes in their browser, enabling session takeover and escalating the confidentiality and integrity impacts to high.
Adobe's security advisory APSB25-08 details the issue and mitigation steps, available at https://helpx.adobe.com/security/products/magento/apsb25-08.html.
Details
- CWE(s)