Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 13 May 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 12 May 2026 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Adobe
Adobe adobe Commerce |
|
| Vendors & Products |
Adobe
Adobe adobe Commerce |
Tue, 12 May 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Adobe Commerce versions 2.4.9-beta1, 2.4.8-p4, 2.4.7-p9, 2.4.6-p14, 2.4.5-p16, 2.4.4-p17 and earlier are affected by a Server-Side Request Forgery (SSRF) vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to bypass security measures and gain unauthorized read access. Exploitation of this issue requires user interaction in that a victim must visit a maliciously crafted URL or interact with a compromised web page. Scope is changed. | |
| Title | Adobe Commerce | Server-Side Request Forgery (SSRF) (CWE-918) | |
| Weaknesses | CWE-918 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: adobe
Published:
Updated: 2026-05-13T14:21:31.899Z
Reserved: 2026-03-30T17:30:36.492Z
Link: CVE-2026-34647
Updated: 2026-05-13T14:21:28.349Z
Status : Undergoing Analysis
Published: 2026-05-12T20:16:35.677
Modified: 2026-05-13T14:49:11.830
Link: CVE-2026-34647
No data.
OpenCVE Enrichment
Updated: 2026-05-12T22:15:25Z