Description
Adobe Commerce versions 2.4.9-beta1, 2.4.8-p4, 2.4.7-p9, 2.4.6-p14, 2.4.5-p16, 2.4.4-p17 and earlier are affected by a Server-Side Request Forgery (SSRF) vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to bypass security measures and gain unauthorized read access. Exploitation of this issue requires user interaction in that a victim must visit a maliciously crafted URL or interact with a compromised web page. Scope is changed.
Published: 2026-05-12
Score: 7.4 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Adobe Commerce is vulnerable to a server‑side request forgery (SSRF) that allows an attacker who can entice a user to visit a malicious URL or interact with a compromised page to bypass security mechanisms and gain unauthorized read access to protected resources. The flaw arises from incorrect handling of remote requests, giving attackers the ability to trick the server into fetching data from internal or restricted addresses, thereby enabling a security feature bypass. This is a scope‑changing vulnerability that can lead to information disclosure and further exploitation once the attacker gains read access.

Affected Systems

Affected are Adobe Commerce 2.4.9-beta1, 2.4.8-p4, 2.4.7-p9, 2.4.6-p14, 2.4.5-p16, 2.4.4-p17 and all earlier releases. The severity applies to any server running those versions of Adobe Commerce.

Risk and Exploitability

The vulnerability carries a CVSS score of 7.4, indicating moderate‑to‑high severity. Exploitation requires user interaction, meaning an attacker must entice the victim into clicking a malicious link or loading a compromised page. Because the attack hinges on user action, the practical likelihood of exploitation is lower than for purely automated attacks, but the impact once achieved is significant. The EPSS score is not available and the vulnerability is not listed in the CISA KEV catalog, so there is no evidence of widespread exploitation yet. Nevertheless, because it allows bypass of security features and unauthorized read access, it warrants prompt remediation.

Generated by OpenCVE AI on May 12, 2026 at 21:44 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Adobe Commerce to a version that includes the SSRF fix, such as the latest release beyond 2.4.9-beta1.
  • Follow the guidance in Adobe’s security advisory to apply the official patch correctly and verify the security feature bypass path is closed.
  • Enhance network security by restricting outbound traffic from the application to internal services, using firewall rules or segmentation to mitigate the impact if the vulnerability remains present.

Generated by OpenCVE AI on May 12, 2026 at 21:44 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 12 May 2026 22:30:00 +0000

Type Values Removed Values Added
First Time appeared Adobe
Adobe adobe Commerce
Vendors & Products Adobe
Adobe adobe Commerce

Tue, 12 May 2026 20:15:00 +0000

Type Values Removed Values Added
Description Adobe Commerce versions 2.4.9-beta1, 2.4.8-p4, 2.4.7-p9, 2.4.6-p14, 2.4.5-p16, 2.4.4-p17 and earlier are affected by a Server-Side Request Forgery (SSRF) vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to bypass security measures and gain unauthorized read access. Exploitation of this issue requires user interaction in that a victim must visit a maliciously crafted URL or interact with a compromised web page. Scope is changed.
Title Adobe Commerce | Server-Side Request Forgery (SSRF) (CWE-918)
Weaknesses CWE-918
References
Metrics cvssV3_1

{'score': 7.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N'}


Subscriptions

Adobe Adobe Commerce
cve-icon MITRE

Status: PUBLISHED

Assigner: adobe

Published:

Updated: 2026-05-12T19:50:31.829Z

Reserved: 2026-03-30T17:30:36.492Z

Link: CVE-2026-34647

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-12T20:16:35.677

Modified: 2026-05-12T20:16:35.677

Link: CVE-2026-34647

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-12T22:15:25Z

Weaknesses