Unauthenticated remote code execution vulnerabilities in e-commerce platforms carry outsized risk because they require no credentials, no social engineering, and no insider access — only a reachable endpoint.
A newly disclosed flaw called PolyShell meets that description exactly. According to the report, the vulnerability affects all stable version 2 installations of both Magento Open Source and Adobe Commerce, enabling unauthenticated code execution and account takeover. Sansec, the eCommerce security firm that disclosed the issue, states that “the exploit method is circulating already” and expects automated attacks to begin shortly, even though no active exploitation has been confirmed in the wild.
The flaw originates in how Magento‘s REST API handles file uploads tied to cart item custom options. When a product option carries the type “file,” the platform processes an embedded file_info object containing base64-encoded file data, a MIME type, and a filename, then writes that file to pub/media/custom_options/quote/ on the server. The name PolyShell reflects the technique at its core: a polyglot file constructed to behave simultaneously as an image and a script. Depending on how the web server is configured, an attacker can leverage this to achieve remote code execution or, where direct execution is blocked, account takeover through stored cross-site scripting. Sansec says its analysis of known Magento and Adobe Commerce stores found that many expose files in that upload directory.
Adobe has released a fix, but only within the second alpha release for version 2.4.9 — a pre-production build that store operators cannot deploy in live environments.
That gap leaves the entire production install base without an official patch. Adobe does offer a sample web server configuration that the report says “would largely limit the fallout,” but Sansec notes that most stores rely on configurations set by their hosting providers rather than a custom-hardened setup, making that mitigation unreliable in practice for a large portion of affected merchants.
Recommended Actions for Store Operators
Until a production-ready patch is available, Sansec recommends that administrators take three immediate steps:
- Restrict access to the pub/media/custom_options/ directory
- Verify that nginx or Apache rules actively prevent access to that path
- Scan stores for uploaded shells, backdoors, or other malware
Patch Timeline Unclear
No confirmed timeline exists for when Adobe will deliver a fix to stable production versions. The combination of a circulating exploit method, a broad install base, and a patch confined to an alpha release makes the interim window materially risky for any merchant running a default or hosting-provider-managed configuration.
Photo by Tima Miroshnichenko on Pexels
This article is a curated summary based on third-party sources. Source: Read the original article