Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-19132 | Adobe Commerce versions 2.4.8, 2.4.7-p5, 2.4.6-p10, 2.4.5-p12, 2.4.4-p13 and earlier are affected by an Incorrect Authorization vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to bypass security measures and gain limited unauthorized access. Exploitation of this issue requires user interaction. |
Github GHSA |
GHSA-8hcx-xvww-6c6h | Magento Security feature bypass |
Thu, 24 Jul 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Adobe commerce
Adobe commerce B2b Adobe magento |
|
| CPEs | cpe:2.3:a:adobe:commerce:*:*:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.4:-:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.4:p10:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.4:p11:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.4:p12:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.4:p13:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.4:p1:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.4:p2:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.4:p3:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.4:p4:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.4:p5:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.4:p6:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.4:p7:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.4:p8:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.4:p9:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.5:-:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.5:p10:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.5:p11:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.5:p12:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.5:p1:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.5:p2:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.5:p3:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.5:p4:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.5:p5:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.5:p6:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.5:p7:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.5:p8:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.5:p9:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.6:-:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.6:p10:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.6:p1:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.6:p2:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.6:p3:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.6:p4:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.6:p5:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.6:p6:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.6:p7:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.6:p8:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.6:p9:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.7:-:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.7:b1:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.7:b2:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.7:beta3:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.7:p1:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.7:p2:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.7:p3:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.7:p4:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.7:p5:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.8:-:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.8:beta1:*:*:*:*:*:* cpe:2.3:a:adobe:commerce:2.4.8:beta2:*:*:*:*:*:* cpe:2.3:a:adobe:commerce_b2b:*:*:*:*:*:*:*:* cpe:2.3:a:adobe:commerce_b2b:1.3.3:-:*:*:*:*:*:* cpe:2.3:a:adobe:commerce_b2b:1.3.3:p10:*:*:*:*:*:* cpe:2.3:a:adobe:commerce_b2b:1.3.3:p11:*:*:*:*:*:* cpe:2.3:a:adobe:commerce_b2b:1.3.3:p12:*:*:*:*:*:* cpe:2.3:a:adobe:commerce_b2b:1.3.3:p13:*:*:*:*:*:* cpe:2.3:a:adobe:commerce_b2b:1.3.3:p1:*:*:*:*:*:* cpe:2.3:a:adobe:commerce_b2b:1.3.3:p2:*:*:*:*:*:* cpe:2.3:a:adobe:commerce_b2b:1.3.3:p3:*:*:*:*:*:* cpe:2.3:a:adobe:commerce_b2b:1.3.3:p4:*:*:*:*:*:* cpe:2.3:a:adobe:commerce_b2b:1.3.3:p5:*:*:*:*:*:* cpe:2.3:a:adobe:commerce_b2b:1.3.3:p6:*:*:*:*:*:* cpe:2.3:a:adobe:commerce_b2b:1.3.3:p7:*:*:*:*:*:* cpe:2.3:a:adobe:commerce_b2b:1.3.3:p8:*:*:*:*:*:* cpe:2.3:a:adobe:commerce_b2b:1.3.3:p9:*:*:*:*:*:* cpe:2.3:a:adobe:commerce_b2b:1.3.4:-:*:*:*:*:*:* cpe:2.3:a:adobe:commerce_b2b:1.3.4:p10:*:*:*:*:*:* cpe:2.3:a:adobe:commerce_b2b:1.3.4:p11:*:*:*:*:*:* cpe:2.3:a:adobe:commerce_b2b:1.3.4:p12:*:*:*:*:*:* cpe:2.3:a:adobe:commerce_b2b:1.3.4:p1:*:*:*:*:*:* cpe:2.3:a:adobe:commerce_b2b:1.3.4:p2:*:*:*:*:*:* cpe:2.3:a:adobe:commerce_b2b:1.3.4:p3:*:*:*:*:*:* cpe:2.3:a:adobe:commerce_b2b:1.3.4:p4:*:*:*:*:*:* cpe:2.3:a:adobe:commerce_b2b:1.3.4:p5:*:*:*:*:*:* cpe:2.3:a:adobe:commerce_b2b:1.3.4:p6:*:*:*:*:*:* cpe:2.3:a:adobe:commerce_b2b:1.3.4:p7:*:*:*:*:*:* cpe:2.3:a:adobe:commerce_b2b:1.3.4:p8:*:*:*:*:*:* cpe:2.3:a:adobe:commerce_b2b:1.3.4:p9:*:*:*:*:*:* cpe:2.3:a:adobe:commerce_b2b:1.3.5:-:*:*:*:*:*:* cpe:2.3:a:adobe:commerce_b2b:1.3.5:p10:*:*:*:*:*:* cpe:2.3:a:adobe:commerce_b2b:1.3.5:p1:*:*:*:*:*:* cpe:2.3:a:adobe:commerce_b2b:1.3.5:p2:*:*:*:*:*:* cpe:2.3:a:adobe:commerce_b2b:1.3.5:p3:*:*:*:*:*:* cpe:2.3:a:adobe:commerce_b2b:1.3.5:p4:*:*:*:*:*:* cpe:2.3:a:adobe:commerce_b2b:1.3.5:p5:*:*:*:*:*:* cpe:2.3:a:adobe:commerce_b2b:1.3.5:p6:*:*:*:*:*:* cpe:2.3:a:adobe:commerce_b2b:1.3.5:p7:*:*:*:*:*:* cpe:2.3:a:adobe:commerce_b2b:1.3.5:p8:*:*:*:*:*:* cpe:2.3:a:adobe:commerce_b2b:1.3.5:p9:*:*:*:*:*:* cpe:2.3:a:adobe:commerce_b2b:1.4.2:-:*:*:*:*:*:* cpe:2.3:a:adobe:commerce_b2b:1.4.2:p1:*:*:*:*:*:* cpe:2.3:a:adobe:commerce_b2b:1.4.2:p2:*:*:*:*:*:* cpe:2.3:a:adobe:commerce_b2b:1.4.2:p3:*:*:*:*:*:* cpe:2.3:a:adobe:commerce_b2b:1.4.2:p4:*:*:*:*:*:* cpe:2.3:a:adobe:commerce_b2b:1.4.2:p5:*:*:*:*:*:* cpe:2.3:a:adobe:commerce_b2b:1.5.2:-:*:*:*:*:*:* cpe:2.3:a:adobe:magento:*:*:*:*:open_source:*:*:* cpe:2.3:a:adobe:magento:2.4.5:-:*:*:open_source:*:*:* cpe:2.3:a:adobe:magento:2.4.5:p10:*:*:open_source:*:*:* cpe:2.3:a:adobe:magento:2.4.5:p11:*:*:open_source:*:*:* cpe:2.3:a:adobe:magento:2.4.5:p12:*:*:open_source:*:*:* cpe:2.3:a:adobe:magento:2.4.5:p1:*:*:open_source:*:*:* cpe:2.3:a:adobe:magento:2.4.5:p2:*:*:open_source:*:*:* cpe:2.3:a:adobe:magento:2.4.5:p3:*:*:open_source:*:*:* cpe:2.3:a:adobe:magento:2.4.5:p4:*:*:open_source:*:*:* cpe:2.3:a:adobe:magento:2.4.5:p5:*:*:open_source:*:*:* cpe:2.3:a:adobe:magento:2.4.5:p6:*:*:open_source:*:*:* cpe:2.3:a:adobe:magento:2.4.5:p7:*:*:open_source:*:*:* cpe:2.3:a:adobe:magento:2.4.5:p8:*:*:open_source:*:*:* cpe:2.3:a:adobe:magento:2.4.5:p9:*:*:open_source:*:*:* cpe:2.3:a:adobe:magento:2.4.6:-:*:*:open_source:*:*:* cpe:2.3:a:adobe:magento:2.4.6:p10:*:*:open_source:*:*:* cpe:2.3:a:adobe:magento:2.4.6:p1:*:*:open_source:*:*:* cpe:2.3:a:adobe:magento:2.4.6:p2:*:*:open_source:*:*:* cpe:2.3:a:adobe:magento:2.4.6:p3:*:*:open_source:*:*:* cpe:2.3:a:adobe:magento:2.4.6:p4:*:*:open_source:*:*:* cpe:2.3:a:adobe:magento:2.4.6:p5:*:*:open_source:*:*:* cpe:2.3:a:adobe:magento:2.4.6:p6:*:*:open_source:*:*:* cpe:2.3:a:adobe:magento:2.4.6:p7:*:*:open_source:*:*:* cpe:2.3:a:adobe:magento:2.4.6:p8:*:*:open_source:*:*:* cpe:2.3:a:adobe:magento:2.4.6:p9:*:*:open_source:*:*:* cpe:2.3:a:adobe:magento:2.4.7:-:*:*:open_source:*:*:* cpe:2.3:a:adobe:magento:2.4.7:p1:*:*:open_source:*:*:* cpe:2.3:a:adobe:magento:2.4.7:p2:*:*:open_source:*:*:* cpe:2.3:a:adobe:magento:2.4.7:p3:*:*:open_source:*:*:* cpe:2.3:a:adobe:magento:2.4.7:p4:*:*:open_source:*:*:* cpe:2.3:a:adobe:magento:2.4.7:p5:*:*:open_source:*:*:* cpe:2.3:a:adobe:magento:2.4.8:-:*:*:open_source:*:*:* |
|
| Vendors & Products |
Adobe commerce
Adobe commerce B2b Adobe magento |
Wed, 25 Jun 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 25 Jun 2025 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Adobe Commerce versions 2.4.8, 2.4.7-p5, 2.4.6-p10, 2.4.5-p12, 2.4.4-p13 and earlier are affected by an Incorrect Authorization vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to bypass security measures and gain limited unauthorized access. Exploitation of this issue requires user interaction. | |
| Title | Adobe Commerce | Incorrect Authorization (CWE-863) | |
| Weaknesses | CWE-863 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: adobe
Published:
Updated: 2025-06-25T18:08:05.106Z
Reserved: 2025-06-06T15:42:09.517Z
Link: CVE-2025-49550
Updated: 2025-06-25T18:07:57.231Z
Status : Analyzed
Published: 2025-06-25T18:15:22.323
Modified: 2025-07-24T19:20:44.147
Link: CVE-2025-49550
No data.
OpenCVE Enrichment
Updated: 2025-07-06T22:16:31Z
EUVD
Github GHSA