Adobe Commerce 2.4.9 & Critical Security Patches: What Every Store Owner Must Know

Table of Contents

Adobe has released its most substantial Commerce update in years: with 560+ bug fixes, hardened security patches actively exploited in the wild, and major platform upgrades. Here is everything your team needs to understand and act on, explained plainly.

The Big Picture: What Has Adobe Released?

Adobe Commerce has released two distinct but related update tracks that every store owner needs to understand:

  1. Adobe Commerce 2.4.9: A major feature and platform release with 560 fixes, modernised UI libraries, payment improvements, and PHP/infrastructure upgrades. Currently in beta, but important to plan for now.
  2. 2.4.8 Security Patches (p1–p5): A series of emergency security-only releases for stores already on 2.4.8. Several address vulnerabilities that are already being actively exploited by attackers in the wild. These must be applied immediately.

Think of it this way: the security patches are your urgent medication, and 2.4.9 is the full health plan you build toward. Both deserve your attention, but the security patches are time-critical.

2.4.8 Security Patches: What Was Broken and What Got Fixed

Adobe has released five security patch increments for the 2.4.8 line (p1 through p5), each targeting specific vulnerabilities. The table below gives a plain-English breakdown of the most critical ones.

Severity CVE / Bulletin Vulnerability Impact & Fix
CRITICAL CVE-2025-54236
(APSB25-88)
Customer Account
Takeover via REST API
Attackers hijacked accounts without a password.
Actively exploited in the wild.
Fixed in 2.4.8-p3.
CRITICAL CVE-2025-24434
(APSB25-08)
Authorisation Bypass:
Privilege Escalation
A flaw in permission verification allowed attackers
to escalate privileges and access protected areas.
IMPORTANT CVE-2025-47110
(APSB25-50)
Stored XSS via
Server-Side Template
Injection
Malicious scripts injected through email templates
run in every victim’s browser when viewing affected content.
IMPORTANT VULN-31547
(APSB25-50)
Reflected XSS +
One-Click Account
Takeover
Reflected XSS in the marketplace combined with one-click
ATO in Adobe IMS-connected instances.
IMPORTANT CVE-2025-54263-54267
(APSB25-94)
Arbitrary Code
Execution:
Unauthenticated
CVSS 8.8. Unauthenticated attackers could bypass privilege
checks and execute code: full site compromise possible.
FIXED API Regression
(APSB25-08 follow-up)
Bulk API Slowdown
After Security Patch
Applying APSB25-08 caused bulk async API endpoints
to slow significantly. Fixed in 2.4.8-p1.

Why This Is Urgent

Adobe confirmed that CVE-2025-54236 was actively exploited in the wild at the time of disclosure. This means real attackers were already using this technique to compromise live stores, not just researchers testing in a lab. Any store on an unpatched version of 2.4.8 is currently exposed to account takeover without any authentication required.

Adobe Commerce 2.4.9: What’s New and Why It Matters

Beyond security, the 2.4.9 release signals a forward-looking platform overhaul. With over 560 fixes in the Adobe Commerce beta alone, here are the headline improvements that affect your day-to-day store operations.

560
Bug fixes in Adobe Commerce 2.4.9
501
Fixes in Magento Open Source 2.4.9
5+
Security patches released for 2.4.8
3
Core technical components modernised

Smarter Admin Experience

Two-Factor Authentication (2FA) has been simplified. Previously, if multiple 2FA methods were enabled, say, Google Authenticator and a hardware security key, every admin user was forced to set up all of them before logging in. In 2.4.9, users only need to configure one method. This removes a real-world barrier for team members who don’t have access to every authentication device.

The staging preview tool now accurately simulates how your store looks on mobile devices. Before this fix, the mobile preview in the admin panel was often misleading: store owners would approve a promotion layout that looked fine on desktop but was broken on phones. Now what you see is genuinely what customers see.

Checkout and Payments: Where the Revenue Is

Google Pay and Apple Pay express checkout now fully support promo and offer codes. Previously, shoppers using these fast payment methods couldn’t apply discount codes, meaning express checkout customers missed out on promotions available to everyone else. That friction is now removed, directly improving conversion rates.

The PayPal Express shipping callback has been moved from the browser (client-side) to the server (server-side). In plain terms: calculating shipping costs during PayPal Express checkout is now more reliable and secure, as it no longer depends on what the shopper’s browser reports.

For B2B merchants, a persistent bug with Payflow Pro checkout on negotiable quotes has been resolved: orders would hang indefinitely without placing or showing an error, causing silent revenue loss for affected stores.

Catalogue and Admin Productivity

The Catalog Price Rules grid now includes bulk actions: activate, deactivate, or delete multiple rules at once. This brings catalogue rules in line with cart price rules and saves significant time for stores managing large sets of promotions.

Security Hardening and Library Upgrades

Three JavaScript libraries central to the Adobe Commerce UI have been upgraded: jQuery UI to 1.14.1, jQuery Validate to 1.21.0, and the Uppy file upload library to 4.13.4. These are not cosmetic changes: older versions had known security vulnerabilities in file upload handling and form input validation. The upgrades patch those holes while also improving compatibility with modern browsers.

CAPTCHA enforcement has been extended to REST and GraphQL APIs. Previously, if you enabled CAPTCHA on your customer registration form, a bot could bypass it entirely by hitting the API directly rather than going through the browser form. That gap is now closed.

Platform Compatibility Note

Adobe Commerce 2.4.9 is still in beta and is not yet intended for production deployment. However, understanding its changes now allows your team to plan extensions, theme updates, and infrastructure upgrades ahead of the GA release, avoiding emergency scrambles later.

The Cost of Not Updating: A Plain Comparison

The table below shows the real business consequences of running an unpatched store versus one that has been properly updated.

Area Unpatched Store Updated Store
Customer account security ✗ Exposed: accounts hijacked via REST API (CVE-2025-54236) ✓ Protected with validated API access controls
Admin access ✗ Privilege escalation possible without valid credentials ✓ Authorisation properly enforced at every layer
Malicious scripts ✗ XSS via email template injection allows script execution ✓ Input sanitisation and output encoding hardened
Express checkout conversions ✗ Promo codes unavailable for Apple Pay / Google Pay shoppers ✓ Full promo support across all checkout flows
Bulk API performance ✗ Degraded speed from unresolved performance regression ✓ Bulk endpoints restored to expected throughput
PCI DSS compliance ✗ Running known-vulnerable software may breach compliance
obligations
✓ Patches maintain platform eligibility for compliance audits
B2B negotiable quote checkout ✗ Payflow Pro orders silently fail : lost revenue, no error shown ✓ Orders place reliably from negotiable quote flows

How Viha Digital Commerce Handles This For You

Applying Adobe Commerce patches is not a case of clicking ‘update’ in a dashboard. It involves compatibility testing against your custom theme and extensions, database backup and rollback planning, staged deployment to avoid downtime, and B2B module updates that must follow the main patch in a specific sequence. Getting any of these steps wrong can take a store offline.

As an Adobe Commerce development company, we specialise in exactly this kind of structuOur Commitmentred, risk-managed update work. Here is what our process looks like:

  1. Compatibility Audit: We audit your current version, all installed extensions, and your theme against the target patch or version. Any conflicts are identified before a single line change in production.
  2. Staging Environment Deployment: The patch or upgrade is applied first to a staging clone of your live store. We run full regression testing across checkout, payment flows, admin functions, and API integrations.
  3. Database Backup and Rollback Plan: Before touching production, a verified backup is created, and a documented rollback procedure is in place. If something unexpected happens, we can restore it within minutes.
  4. Production Deployment: Production is updated during your lowest-traffic window with a minimal maintenance notice. B2B extension updates are applied in the correct sequence as required by Adobe’s documentation.
  5. Post-Update Verification: We run a full smoke test on checkout, payments, admin panel access, email templates, and API endpoints. You receive a report confirming the patch status and any items to monitor.

What We Specifically Help With for These Updates

Applying the CVE-2025-54236 hotfix (VULN-32437) and verifying the custom attributes module is version 0.4.0 or higher

Sequenced B2B extension patching, which must follow the core patch in the correct order

2FA configuration review and rollout to admin users after the simplified 2.4.9 flow change

API endpoint performance validation after the APSB25-08 regression fix

Theme and extension compatibility review ahead of the 2.4.9 GA release

REST API constructor parameter validation review for custom or third-party extensions (required by CVE-2025-54236 changes)

Encryption key migration via CLI (the Admin UI option has been removed in newer patches)

Our Commitment

We treat every update as a production-critical engineering task: not a box-ticking exercise. Our team has applied Adobe Commerce security patches across stores ranging from startup catalogues to enterprise B2B deployments, and we carry a zero-downtime track record on patch deployments.

The Bottom Line

Adobe Commerce’s security patch cycle has become more aggressive in 2025 for good reason: the platform is a high-value target, and the vulnerabilities being disclosed are serious. CVE-2025-54236 alone: a customer account takeover that requires no authentication, is the kind of flaw that can wipe out customer trust overnight if exploited on your store.

The 2.4.9 release, meanwhile, is not just a maintenance tick. Fixes to Apple Pay and Google Pay promo support, the admin 2FA flow, bulk catalogue management, and over 560 resolved bugs represent real quality-of-life improvements and potential revenue recovery for stores that have been working around known issues.

The question is not whether to apply these updates: it is how to do it safely, quickly, and with confidence. That is precisely where Viha Digital Commerce adds its value.

 

Ready to secure and upgrade your store?

Our team can assess your current patch status, identify exposure, and deploy the right updates: without downtime and without surprises.

Contact Viha Digital Commerce  →  vihadigitalcommerce.com

editor's pick

Get A Quick Quote

Your eCommerce Solution Specialist

    Get Expert Solutions

    Go to Top