CVE-2025-24417
Published: 11 February 2025
Summary
CVE-2025-24417 is a high-severity Cross-site Scripting (CWE-79) vulnerability in Adobe Commerce. Its CVSS base score is 8.7 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Browser Session Hijacking (T1185); ranked in the top 20.0% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-15 (Information Output Filtering).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly enforces validation and sanitization of user inputs in vulnerable form fields to block injection of malicious JavaScript.
Filters information outputs from pages containing injected content to prevent execution of malicious scripts in victims' browsers.
Requires timely identification, reporting, and patching of the specific input sanitization flaw in affected Adobe Commerce versions.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Stored XSS enables injection and execution of malicious JavaScript in victim browser context, directly facilitating browser session hijacking and takeover as described.
NVD Description
Adobe Commerce versions 2.4.8-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed…
more
in a victim’s browser when they browse to the page containing the vulnerable field. A successful attacker can abuse this to achieve session takeover, increasing the confidentiality and integrity impact as high.
Deeper analysisAI
CVE-2025-24417 is a stored Cross-Site Scripting (XSS) vulnerability, classified under CWE-79, affecting Adobe Commerce versions 2.4.8-beta1, 2.4.7-p3, 2.4.6-p8, 2.4.5-p10, 2.4.4-p11, and earlier. The issue resides in vulnerable form fields that fail to properly sanitize user input, enabling the injection of malicious JavaScript. Published on 2025-02-11, it carries a CVSS v3.1 base score of 8.7 (AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N), indicating high severity due to network accessibility, low attack complexity, and changed scope.
A low-privileged attacker with existing access can exploit this vulnerability by injecting malicious scripts into the affected form fields. When a victim user browses to the page containing the injected content, the JavaScript executes in their browser context. This can lead to session takeover, compromising high confidentiality and integrity without impacting availability.
Adobe's security bulletin APSB25-08 details mitigation strategies and available patches: https://helpx.adobe.com/security/products/magento/apsb25-08.html.
Details
- CWE(s)