• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
magento polyshell flaw enables unauthenticated uploads, rce and account takeover

Magento PolyShell Flaw Enables Unauthenticated Uploads, RCE and Account Takeover

You are here: Home / General Cyber Security News / Magento PolyShell Flaw Enables Unauthenticated Uploads, RCE and Account Takeover
March 20, 2026

Sansec is warning of a critical security flaw in Magento’s REST API that could allow unauthenticated attackers to upload arbitrary executables and achieve code execution and account takeover.

The vulnerability has been codenamed PolyShell by Sansec owing to the fact that the attack hinges on disguising malicious code as an image. There is no evidence that the shortcoming has been exploited in the wild. The unrestricted file upload flaw affects all Magento Open Source and Adobe Commerce versions up to 2.4.9-alpha2.

The Dutch security firm said the problem stems from the fact that Magento’s REST API accepts file uploads as part of the custom options for the cart item.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


“When a product option has type ‘file,’ Magento processes an embedded file_info object containing base64-encoded file data, a MIME type, and a filename,” it said. “The file is written to pub/media/custom_options/quote/ on the server.”

Depending on the web server configuration, the flaw can enable remote code execution via PHP upload or account takeover via stored XSS.

Cybersecurity

Sansec also noted that Adobe fixed the issue in the 2.4.9 pre-release branch as part of APSB25-94, but leaves current production versions without an isolated patch.

“While Adobe provides a sample web server configuration that would largely limit the fallout, the majority of stores use a custom configuration from their hosting provider,” it added.

To mitigate any potential risk, e-commerce storefronts are advised to perform the following steps –

  • Restrict access to the upload directory (“pub/media/custom_options/”).
  • Verify that nginx or Apache rules prevent access to the directory.
  • Scan the stores for web shells, backdoors, and other malware.

“Blocking access does not block uploads, so people will still be able to upload malicious code if you aren’t using a specialized WAF [Web Application Firewall],” Sansec said.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «doj disrupts 3 million device iot botnets behind record 31.4 tbps DoJ Disrupts 3 Million-Device IoT Botnets Behind Record 31.4 Tbps Global DDoS Attacks
Next Post: The Importance of Behavioral Analytics in AI-Enabled Cyber Attacks the importance of behavioral analytics in ai enabled cyber attacks»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Google Adds 24-Hour Wait for Unverified App Sideloading to Reduce Malware and Scams
  • The Importance of Behavioral Analytics in AI-Enabled Cyber Attacks
  • Magento PolyShell Flaw Enables Unauthenticated Uploads, RCE and Account Takeover
  • DoJ Disrupts 3 Million-Device IoT Botnets Behind Record 31.4 Tbps Global DDoS Attacks
  • Apple Warns Older iPhones Vulnerable to Coruna, DarkSword Exploit Kit Attacks
  • Speagle Malware Hijacks Cobra DocGuard to Steal Data via Compromised Servers
  • 54 EDR Killers Use BYOVD to Exploit 34 Signed Vulnerable Drivers and Disable Security
  • ThreatsDay Bulletin: FortiGate RaaS, Citrix Exploits, MCP Abuse, LiveChat Phish & More
  • New Perseus Android Banking Malware Monitors Notes Apps to Extract Sensitive Data
  • How Ceros Gives Security Teams Visibility and Control in Claude Code

Copyright © TheCyberSecurity.News, All Rights Reserved.