CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

Unauthenticated Remote Code Execution and Account Takeover via Magento PolyShell File Upload Flaw

First reported
Last updated
1 unique sources, 1 articles

Summary

Hide ▲

A critical unrestricted file upload vulnerability in Magento’s REST API, dubbed PolyShell by Sansec, enables unauthenticated attackers to upload arbitrary executable files disguised as images and achieve remote code execution (RCE) or account takeover via stored cross-site scripting (XSS). The flaw impacts all Magento Open Source and Adobe Commerce versions up to 2.4.9-alpha2 by leveraging the custom cart item option handling in the REST API, which writes uploaded files to the server’s `pub/media/custom_options/quote/` directory. Depending on web server configuration, this can lead to RCE through PHP execution or stored XSS via malicious payloads in file metadata. No evidence of active exploitation has been observed.

Timeline

  1. 20.03.2026 11:30 1 articles · 5h ago

    Magento PolyShell Unrestricted File Upload Flaw Disclosed; RCE and Account Takeover Risk Identified

    A critical unrestricted file upload vulnerability in Magento’s REST API (PolyShell) permits unauthenticated file uploads to the server’s `pub/media/custom_options/quote/` directory. The flaw enables remote code execution via PHP execution or account takeover via stored XSS, depending on web server settings. Adobe patched the issue in 2.4.9 pre-release builds (APSB25-94), but production versions remain exposed due to reliance on hosting provider configurations.

    Show sources

Information Snippets