Miggo Logo

CVE-2025-24409:
Adobe Commerce Improper Authorization vulnerability

8.2

CVSS Score
3.1

Basic Information

EPSS Score
0.32499%
Published
2/11/2025
Updated
3/17/2025
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
magento/community-editioncomposer>= 2.4.7-beta1, < 2.4.7-p42.4.7-p4
magento/community-editioncomposer>= 2.4.6-p1, < 2.4.6-p92.4.6-p9
magento/community-editioncomposer>= 2.4.5-p1, < 2.4.5-p112.4.5-p11
magento/community-editioncomposer< 2.4.4-p122.4.4-p12
magento/community-editioncomposer= 2.4.7
magento/community-editioncomposer= 2.4.6
magento/community-editioncomposer= 2.4.5
magento/community-editioncomposer= 2.4.4
magento/community-editioncomposer= 2.4.8-beta1
magento/project-community-editioncomposer<= 2.0.2

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability centers on improper authorization (CWE-285/CWE-863) in Adobe Commerce. Magento's admin controllers typically require explicit authorization checks via the _isAllowed() method. The absence of these checks in critical admin endpoints (like AdminNotification or Integration modules) would align with the described security bypass. Similarly, misconfigured API endpoints in webapi.xml could allow privilege escalation. These hypotheses align with historical Magento authorization flaws and the CVSS vector (network-accessible, no privileges required). Confidence is medium due to lack of direct patch details, but the patterns match the vulnerability's characteristics.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

**o** *omm*r** v*rsions *.*.*-**t**, *.*.*-p*, *.*.*-p*, *.*.*-p**, *.*.*-p** *n* **rli*r *r* *****t** *y *n Improp*r *ut*oriz*tion vuln*r**ility t**t *oul* r*sult in * S**urity ***tur* *yp*ss. *n *tt**k*r *oul* l*v*r*** t*is vuln*r**ility to *yp*ss

Reasoning

T** vuln*r**ility **nt*rs on improp*r *ut*oriz*tion (*W*-***/*W*-***) in **o** *omm*r**. M***nto's **min *ontroll*rs typi**lly r*quir* *xpli*it *ut*oriz*tion ****ks vi* t** _is*llow**() m*t*o*. T** **s*n** o* t**s* ****ks in *riti**l **min *n*points