The flaw, discovered by the Sansec Forensics Team and disclosed on March 17, 2026, affects Magento’s REST API.
It allows unauthenticated attackers to upload malicious files directly to the server, without needing valid credentials.
With no official patch available for current production versions, the risk remains high for e-commerce platforms worldwide.
The vulnerability exists in Magento’s anonymous guest cart functionality. When users add items to a cart, the system accepts custom file options.
These files are processed using base64-encoded data, along with a MIME type and filename.
However, the application fails to properly validate these inputs. It does not verify whether a file upload is required, ignores option ID checks, and lacks restrictions on file extensions.
As a result, attackers can upload malicious scripts disguised as harmless image files.
Threat actors are using polyglot files with malicious code hidden inside seemingly valid GIF or PNG images to bypass security filters.
A common technique involves embedding PHP code within a GIF89a header, allowing the file to execute on the server once uploaded.
The vulnerability affects multiple Magento and Adobe Commerce versions:
The issue is only patched in the unreleased 2.4.9-alpha3 branch, leaving most production systems exposed.
Sansec researchers reported mass scanning and active exploitation starting March 19, 2026, indicating that attackers quickly weaponized the flaw.
Security teams should watch for suspicious files and activity, including:
These web shells often allow attackers to execute arbitrary commands, upload additional malware, and maintain persistent access.
Until an official patch is released, organizations must take immediate defensive steps. Deploying a Web Application Firewall (WAF) is strongly recommended to block exploit attempts in real time.
Administrators should also restrict access to the pub/media/custom_options/ directory, where malicious files are typically stored. Nginx users must enforce strict deny rules, while Apache users should verify .htaccess protections are properly configured.
Finally, regular file system scans are critical. Even if initial execution fails, malicious uploads can remain dormant and be triggered later.
Follow us on Google News , LinkedIn and X to Get More Instant Updates. Set Cyberpress as a Preferred Source in Google
The post Hackers Exploit Magento Flaw for Remote Code Execution and Account Takeover appeared first on Cyber Security News.
PEARL CITY, Ill. (WTVO) — Pearl City, Stephenson County, is recovering from significant damage after…
JOHNSON COUNTY, Ind. (WOWO) — More than 20 people were arrested in Johnson County Wednesday…
Consolidate your car's emergency kit with this combination cordless jump starter, tire inflator, and power…
Between the ubiquitous virtual assistants cheerfully patronising us from almost every electronic device and the…
If you're a Windows user who's looking for a PC version of the Apple Mac…
FORT WAYNE, Ind. (WOWO) — The state of Indiana has agreed to let the Indiana…
This website uses cookies.