Magento Polyshell — The Latest Magento Threat (APSB25-94)

Akamai SIG is a global team of world-class researchers, engineers, strategists, and data scientists with a broad range of expertise and security disciplines. Our data sources include the enormous Akamai Cloud, open sources, collaboration with third parties, and dark web intelligence. We have also developed our own algorithms and tools that help us deliver our research and keep Akamai security solutions up to date.

Share

Executive summary

  • In October 2025, Adobe published security bulletin APSB25-94. Subsequent research published by Sansec on March 17, 2026, describes how the vulnerabilities in APSB25-94 can be used to achieve unauthenticated remote code execution (RCE). Sansec named this attack “PolyShell.”

  • The vulnerabilities allow for unauthenticated unrestricted file uploads which, under specific web server configurations, can result in an attacker being able to execute code on the server. 

  • The vulnerabilities affect every production version of Magento Open Source and Adobe Commerce. Although Adobe is addressing this issue, many production environments remain at risk. 

  • Akamai has proactively deployed an Adaptive Security Engine Rapid Rule to protect our customers from this threat.

Vulnerability details

At the center of the issue is an unauthenticated file upload vulnerability within Magento's REST API. Specifically, the API accepts file uploads as part of the "cart item custom options." When a product option is set to the "file" type, Magento processes an embedded file_info object containing base64-encoded data.

The PolyShell attack works by bypassing Magento’s ImageContentValidator. Because the validator only checks if the file has a valid size and a standard image MIME type (like image/png), it fails to verify whether the file extension matches the content. Attackers can upload a "polyglot" file, a file that appears to the validator as a valid image but contains executable PHP code.

Please note: This vulnerability does not require authentication. An attacker only needs a Guest Cart ID and a product SKU (both easily obtainable) to execute the upload.

The vulnerability is present in the following versions of Magento Open Source and Adobe Commerce:

 

Vulnerable version(s)

Fixed version

2.4.8 and earlier

2.4.9-alpha3 (partial; See Adobe advisory)

2.4.9-alpha1

2.4.9-alpha3

2.4.9-alpha2

2.4.9-alpha3

Mitigation with Akamai App & API Protector

On March 27, 2026, Akamai deployed an Adaptive Security Engine Rapid Rule for App & API Protector customers to provide full coverage.

  • 3000982 — Magento PolyShell (APSB25-94) Attack Detected

Summary

A new rule within Akamai App & API Protector has been deployed to protect our customers from the latest Magento threat. However, the most effective defense will always be to promptly apply the patches provided by the vendor. Given the severity of this issue, any patches should be applied as soon as possible.

The Akamai Security Intelligence Group will continue to monitor, report on, and create mitigations for threats such as these for both our customers and the security community at large. To keep up with more breaking news from the Akamai Security Intelligence Group, check out our research home page and follow us on social media.

Akamai SIG is a global team of world-class researchers, engineers, strategists, and data scientists with a broad range of expertise and security disciplines. Our data sources include the enormous Akamai Cloud, open sources, collaboration with third parties, and dark web intelligence. We have also developed our own algorithms and tools that help us deliver our research and keep Akamai security solutions up to date.

Tags

Share

Related Blog Posts

Security Research
CVE-2026-34354: Guardicore Local Privilege Escalation Vulnerability
May 08, 2026
Read the technical details of a security vulnerability (CVE-2026-34354) in Akamai Guardicore Platform Agent for Windows — and get clear guidance on mitigation.
Security Research
The New Ouroboros Technique and How It Fits in dMSA’s Security Model
May 04, 2026
dMSA is more than a service account migration feature. Learn what its security model is trying to protect, how the implementation works, and where Ouroboros fits.
Security Research
A Shortcut to Coercion: Incomplete Patch of APT28's Zero-Day Leads to CVE-2026-32202
April 23, 2026
Akamai researchers reveal how an incomplete patch for APT28's zero-day led to CVE-2026-32202, a zero-click vulnerability enabling NTLM authentication coercion.