NCSC-2026-0152

Vulnerability from csaf_ncscnl - Published: 2026-05-13 09:27 - Updated: 2026-05-13 09:27
Summary
Kwetsbaarheden verholpen in Adobe Commerce
Notes
The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions: NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein. NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory. This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.
Feiten: Adobe heeft meerdere kwetsbaarheden verholpen in Adobe Commerce.
Interpretaties: De kwetsbaarheden bevinden zich in verschillende versies van Adobe Commerce, waaronder 2.4.9-beta1 en eerdere versies. Een Incorrect Authorization kwetsbaarheid maakt het mogelijk voor aanvallers om autorisatiecontroles te omzeilen en ongeautoriseerde schrijfrechten te verkrijgen zonder gebruikersinteractie. Daarnaast is er een Server-Side Request Forgery (SSRF) kwetsbaarheid die aanvallers in staat stelt beveiligingsmaatregelen te omzeilen en ongeautoriseerde leesrechten te verkrijgen door het serververzoek te manipuleren, waarvoor wel gebruikersinteractie via een kwaadaardige URL of webpagina nodig is. Verder is er een Uncontrolled Resource Consumption kwetsbaarheid die zonder gebruikersinteractie kan worden misbruikt om systeembronnen uit te putten, wat resulteert in een denial-of-service situatie die de beschikbaarheid van het Adobe Commerce platform beïnvloedt.
Oplossingen: Adobe heeft updates uitgebracht om de kwetsbaarheden in Adobe Commerce te verhelpen. Zie bijgevoegde referenties voor meer informatie.
Kans: medium
Schade: high
CWE-400: Uncontrolled Resource Consumption
CWE-863: Incorrect Authorization
CWE-918: Server-Side Request Forgery (SSRF)

Adobe Commerce versions 2.4.9-beta1 and earlier contain an Incorrect Authorization vulnerability that enables attackers to bypass security controls and gain unauthorized write access without user interaction.

CWE-863 - Incorrect Authorization
Affected products
Product Identifier Version Remediation
vers:unknown/*
Adobe / Commerce
vers:unknown/*
vers:unknown/*
Adobe / Commerce B2B
vers:unknown/*
vers:unknown/*
Adobe / Magento Open Source
vers:unknown/*

Adobe Commerce versions 2.4.9-beta1 and earlier contain an Incorrect Authorization vulnerability that enables attackers to bypass security controls and gain unauthorized write access without user interaction.

CWE-863 - Incorrect Authorization
Affected products
Product Identifier Version Remediation
vers:unknown/*
Adobe / Commerce
vers:unknown/*
vers:unknown/*
Adobe / Commerce B2B
vers:unknown/*
vers:unknown/*
Adobe / Magento Open Source
vers:unknown/*

Adobe Commerce versions up to 2.4.9-beta1 contain a Server-Side Request Forgery (SSRF) vulnerability that can bypass security controls and enable unauthorized read access via user interaction with malicious URLs or compromised webpages.

CWE-918 - Server-Side Request Forgery (SSRF)
Affected products
Product Identifier Version Remediation
vers:unknown/*
Adobe / Commerce
vers:unknown/*
vers:unknown/*
Adobe / Commerce B2B
vers:unknown/*
vers:unknown/*
Adobe / Magento Open Source
vers:unknown/*

Adobe Commerce versions 2.4.4-p17 through 2.4.9-beta1 and earlier contain an Uncontrolled Resource Consumption vulnerability exploitable without user interaction, leading to application denial-of-service by exhausting system resources.

Affected products
Product Identifier Version Remediation
vers:unknown/*
Adobe / Commerce
vers:unknown/*
vers:unknown/*
Adobe / Commerce B2B
vers:unknown/*
vers:unknown/*
Adobe / Magento Open Source
vers:unknown/*

Adobe Commerce versions 2.4.4-p17 through 2.4.9-beta1 and earlier contain an Uncontrolled Resource Consumption vulnerability exploitable without user interaction, leading to application denial-of-service by exhausting system resources.

Affected products
Product Identifier Version Remediation
vers:unknown/*
Adobe / Commerce
vers:unknown/*
vers:unknown/*
Adobe / Commerce B2B
vers:unknown/*
vers:unknown/*
Adobe / Magento Open Source
vers:unknown/*

Adobe Commerce versions 2.4.4-p17 through 2.4.9-beta1 and earlier contain an Uncontrolled Resource Consumption vulnerability exploitable without user interaction, leading to application denial-of-service by exhausting system resources.

Affected products
Product Identifier Version Remediation
vers:unknown/*
Adobe / Commerce
vers:unknown/*
vers:unknown/*
Adobe / Commerce B2B
vers:unknown/*
vers:unknown/*
Adobe / Magento Open Source
vers:unknown/*

{
  "document": {
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE"
      }
    },
    "lang": "nl",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n    NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n    NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n    This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
      },
      {
        "category": "description",
        "text": "Adobe heeft meerdere kwetsbaarheden verholpen in Adobe Commerce.",
        "title": "Feiten"
      },
      {
        "category": "description",
        "text": "De kwetsbaarheden bevinden zich in verschillende versies van Adobe Commerce, waaronder 2.4.9-beta1 en eerdere versies. Een Incorrect Authorization kwetsbaarheid maakt het mogelijk voor aanvallers om autorisatiecontroles te omzeilen en ongeautoriseerde schrijfrechten te verkrijgen zonder gebruikersinteractie. Daarnaast is er een Server-Side Request Forgery (SSRF) kwetsbaarheid die aanvallers in staat stelt beveiligingsmaatregelen te omzeilen en ongeautoriseerde leesrechten te verkrijgen door het serververzoek te manipuleren, waarvoor wel gebruikersinteractie via een kwaadaardige URL of webpagina nodig is. Verder is er een Uncontrolled Resource Consumption kwetsbaarheid die zonder gebruikersinteractie kan worden misbruikt om systeembronnen uit te putten, wat resulteert in een denial-of-service situatie die de beschikbaarheid van het Adobe Commerce platform be\u00efnvloedt. ",
        "title": "Interpretaties"
      },
      {
        "category": "description",
        "text": "Adobe heeft updates uitgebracht om de kwetsbaarheden in Adobe Commerce te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
        "title": "Oplossingen"
      },
      {
        "category": "general",
        "text": "medium",
        "title": "Kans"
      },
      {
        "category": "general",
        "text": "high",
        "title": "Schade"
      },
      {
        "category": "general",
        "text": "Uncontrolled Resource Consumption",
        "title": "CWE-400"
      },
      {
        "category": "general",
        "text": "Incorrect Authorization",
        "title": "CWE-863"
      },
      {
        "category": "general",
        "text": "Server-Side Request Forgery (SSRF)",
        "title": "CWE-918"
      }
    ],
    "publisher": {
      "category": "coordinator",
      "contact_details": "cert@ncsc.nl",
      "name": "Nationaal Cyber Security Centrum",
      "namespace": "https://www.ncsc.nl/"
    },
    "references": [
      {
        "category": "external",
        "summary": "Reference",
        "url": "https://helpx.adobe.com/security/products/magento/apsb26-49.html"
      }
    ],
    "title": "Kwetsbaarheden verholpen in Adobe Commerce",
    "tracking": {
      "current_release_date": "2026-05-13T09:27:40.994780Z",
      "generator": {
        "date": "2025-08-04T16:30:00Z",
        "engine": {
          "name": "V.A.",
          "version": "1.3"
        }
      },
      "id": "NCSC-2026-0152",
      "initial_release_date": "2026-05-13T09:27:40.994780Z",
      "revision_history": [
        {
          "date": "2026-05-13T09:27:40.994780Z",
          "number": "1.0.0",
          "summary": "Initiele versie"
        }
      ],
      "status": "final",
      "version": "1.0.0"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:unknown/*",
                "product": {
                  "name": "vers:unknown/*",
                  "product_id": "CSAFPID-1"
                }
              }
            ],
            "category": "product_name",
            "name": "Commerce"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:unknown/*",
                "product": {
                  "name": "vers:unknown/*",
                  "product_id": "CSAFPID-2"
                }
              }
            ],
            "category": "product_name",
            "name": "Commerce B2B"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:unknown/*",
                "product": {
                  "name": "vers:unknown/*",
                  "product_id": "CSAFPID-3"
                }
              }
            ],
            "category": "product_name",
            "name": "Magento Open Source"
          }
        ],
        "category": "vendor",
        "name": "Adobe"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2026-34645",
      "cwe": {
        "id": "CWE-863",
        "name": "Incorrect Authorization"
      },
      "notes": [
        {
          "category": "other",
          "text": "Incorrect Authorization",
          "title": "CWE-863"
        },
        {
          "category": "description",
          "text": "Adobe Commerce versions 2.4.9-beta1 and earlier contain an Incorrect Authorization vulnerability that enables attackers to bypass security controls and gain unauthorized write access without user interaction.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1",
          "CSAFPID-2",
          "CSAFPID-3"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2026-34645 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-34645.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1",
            "CSAFPID-2",
            "CSAFPID-3"
          ]
        }
      ],
      "title": "CVE-2026-34645"
    },
    {
      "cve": "CVE-2026-34646",
      "cwe": {
        "id": "CWE-863",
        "name": "Incorrect Authorization"
      },
      "notes": [
        {
          "category": "other",
          "text": "Incorrect Authorization",
          "title": "CWE-863"
        },
        {
          "category": "description",
          "text": "Adobe Commerce versions 2.4.9-beta1 and earlier contain an Incorrect Authorization vulnerability that enables attackers to bypass security controls and gain unauthorized write access without user interaction.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1",
          "CSAFPID-2",
          "CSAFPID-3"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2026-34646 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-34646.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1",
            "CSAFPID-2",
            "CSAFPID-3"
          ]
        }
      ],
      "title": "CVE-2026-34646"
    },
    {
      "cve": "CVE-2026-34647",
      "cwe": {
        "id": "CWE-918",
        "name": "Server-Side Request Forgery (SSRF)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Server-Side Request Forgery (SSRF)",
          "title": "CWE-918"
        },
        {
          "category": "description",
          "text": "Adobe Commerce versions up to 2.4.9-beta1 contain a Server-Side Request Forgery (SSRF) vulnerability that can bypass security controls and enable unauthorized read access via user interaction with malicious URLs or compromised webpages.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1",
          "CSAFPID-2",
          "CSAFPID-3"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2026-34647 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-34647.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1",
            "CSAFPID-2",
            "CSAFPID-3"
          ]
        }
      ],
      "title": "CVE-2026-34647"
    },
    {
      "cve": "CVE-2026-34648",
      "notes": [
        {
          "category": "description",
          "text": "Adobe Commerce versions 2.4.4-p17 through 2.4.9-beta1 and earlier contain an Uncontrolled Resource Consumption vulnerability exploitable without user interaction, leading to application denial-of-service by exhausting system resources.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1",
          "CSAFPID-2",
          "CSAFPID-3"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2026-34648 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-34648.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1",
            "CSAFPID-2",
            "CSAFPID-3"
          ]
        }
      ],
      "title": "CVE-2026-34648"
    },
    {
      "cve": "CVE-2026-34649",
      "notes": [
        {
          "category": "description",
          "text": "Adobe Commerce versions 2.4.4-p17 through 2.4.9-beta1 and earlier contain an Uncontrolled Resource Consumption vulnerability exploitable without user interaction, leading to application denial-of-service by exhausting system resources.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1",
          "CSAFPID-2",
          "CSAFPID-3"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2026-34649 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-34649.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1",
            "CSAFPID-2",
            "CSAFPID-3"
          ]
        }
      ],
      "title": "CVE-2026-34649"
    },
    {
      "cve": "CVE-2026-34650",
      "notes": [
        {
          "category": "description",
          "text": "Adobe Commerce versions 2.4.4-p17 through 2.4.9-beta1 and earlier contain an Uncontrolled Resource Consumption vulnerability exploitable without user interaction, leading to application denial-of-service by exhausting system resources.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1",
          "CSAFPID-2",
          "CSAFPID-3"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2026-34650 | NCSC-NL Website",
          "url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-34650.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1",
            "CSAFPID-2",
            "CSAFPID-3"
          ]
        }
      ],
      "title": "CVE-2026-34650"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.

Sightings

Author Source Type Date Other

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…