Adobe Commerce 2.4.8 Beta 2

CPE Details

Adobe Commerce 2.4.8 Beta 2
2.4.8
2025-04-25
13h14 +00:00
2025-04-25
13h14 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:adobe:commerce:2.4.8:beta2:*:*:*:*:*:*

Informations

Vendor

adobe

Product

commerce

Version

2.4.8

Update

beta2

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2025-27191 2025-04-08 20h17 +00:00 Adobe Commerce versions 2.4.7-p4, 2.4.6-p9, 2.4.5-p11, 2.4.4-p12, 2.4.8-beta2 and earlier are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to bypass security measures and gain unauthorized access. Exploitation of this issue does not require user interaction.
5.3
Medium
CVE-2025-27192 2025-04-08 20h17 +00:00 Adobe Commerce versions 2.4.7-p4, 2.4.6-p9, 2.4.5-p11, 2.4.4-p12, 2.4.8-beta2 and earlier are affected by an Insufficiently Protected Credentials vulnerability that could lead to a security feature bypass. A high privileged attacker could exploit this vulnerability to gain unauthorized access to protected resources by obtaining sensitive credential information. Exploitation of this issue does not require user interaction.
2.7
Low
CVE-2025-27188 2025-04-08 20h17 +00:00 Adobe Commerce versions 2.4.7-p4, 2.4.6-p9, 2.4.5-p11, 2.4.4-p12, 2.4.8-beta2 and earlier are affected by an Improper Authorization vulnerability that could result in Privilege escalation. An attacker could leverage this vulnerability to bypass security measures and gain unauthorized access. Exploitation of this issue does not require user interaction.
4.3
Medium
CVE-2024-49521 2024-11-12 16h41 +00:00 Adobe Commerce versions 3.2.5 and earlier are affected by a Server-Side Request Forgery (SSRF) vulnerability that could lead to a security feature bypass. A low privileged attacker could exploit this vulnerability to send crafted requests from the vulnerable server to internal systems, which could result in the bypassing of security measures such as firewalls. Exploitation of this issue does not require user interaction.
7.7
High