CVE-2025-24414
Published: 11 February 2025
Summary
CVE-2025-24414 is a high-severity Cross-site Scripting (CWE-79) vulnerability in Adobe Commerce. Its CVSS base score is 8.7 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Browser Session Hijacking (T1185); ranked in the top 20.0% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-15 (Information Output Filtering).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly addresses inadequate sanitization of vulnerable form fields by enforcing validation of user inputs to block malicious script injection.
Prevents execution of injected scripts in victims' browsers by filtering and encoding information outputs from stored content.
Ensures timely remediation of the specific stored XSS flaw in affected Adobe Commerce versions through identification, reporting, and patching.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Stored XSS enables injection of malicious JavaScript that executes in victim browsers, directly facilitating browser session hijacking and takeover as described.
NVD Description
Adobe Commerce versions 2.4.8-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed…
more
in a victim’s browser when they browse to the page containing the vulnerable field. A successful attacker can abuse this to achieve session takeover, increasing the confidentiality and integrity impact as high.
Deeper analysisAI
CVE-2025-24414 is a stored Cross-Site Scripting (XSS) vulnerability, classified under CWE-79, affecting Adobe Commerce versions 2.4.8-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11, and earlier. Published on 2025-02-11, it carries a CVSS v3.1 base score of 8.7 (AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N). The issue stems from inadequate sanitization, allowing malicious scripts to be injected into vulnerable form fields.
A low-privileged attacker can exploit this vulnerability by injecting malicious JavaScript into the affected form fields. When a victim user browses to the page containing the injected content, the script executes in their browser context. This can enable session takeover, resulting in high confidentiality and integrity impacts.
Adobe's security bulletin APSB25-08 provides details on mitigation, available at https://helpx.adobe.com/security/products/magento/apsb25-08.html.
Details
- CWE(s)