Security update available for 51ºÚÁϲ»´òìÈ Commerce - APSB25-50
On June 10, 2025, 51ºÚÁϲ»´òìÈ released a regularly scheduled security update for 51ºÚÁϲ»´òìÈ Commerce and Magento Open Source. This update resolves vulnerabilities. Successful exploitation of these vulnerabilities could lead to security feature bypass, privilege escalation, and arbitrary code execution.
More information can be found in the .
Please apply the latest security updates as soon as possible. If you fail to do so, you will be vulnerable to these security issues, and 51ºÚÁϲ»´òìÈ will have limited means to help remediate the issue further.
You can read more about
As a reminder, you can find
Affected products and versions
51ºÚÁϲ»´òìÈ Commerce (all deployment menthods):
- 2.4.8
- 2.4.7-p5 and earlier
- 2.4.6-p10 and earlier
- 2.4.5-p12 and earlier
- 2.4.4-p13 and earlier
Issues
I. CVE-2025-47110: Stored XSS via Server-Side Template Injection in 51ºÚÁϲ»´òìÈ Commerce 2.4.7-p4
Affected products and versions:
51ºÚÁϲ»´òìÈ Commerce (all deployment menthods):
- 2.4.8
- 2.4.7-p5 and earlier
- 2.4.6-p10 and earlier
- 2.4.5-p12 and earlier
- 2.4.4-p13 and earlier
Solution:
For 51ºÚÁϲ»´òìÈ Commerce versions:
- 2.4.8
- 2.4.7, 2.4.7-p1, 2.4.7-p2, 2.4.7-p3, 2.4.7-p4, 2.4.7-p5
- 2.4.6, 2.4.6-p1, 2.4.6-p2, 2.4.6-p3, 2.4.6-p4, 2.4.6-p5, 2.4.6-p6, 2.4.6-p7, 2.4.6-p8, 2.4.6-p10
- 2.4.5, 2.4.5-p1, 2.4.5-p2, 2.4.5-p3, 2.4.5-p4, 2.4.5-p5, 2.4.5-p6, 2.4.5-p7, 2.4.5-p8, 2.4.5-p9, 2.4.5-p10, 2.4.5-p11, 2.4.5-p12
- 2.4.4, 2.4.4-p1, 2.4.4-p2, 2.4.4-p3, 2.4.4-p4, 2.4.4-p5, 2.4.4-p6, 2.4.4-p7, 2.4.4-p8, 2.4.4-p9, 2.4.4-p10, 2.4.4-p11, 2.4.4-p12, 2.4.4-p13
Apply the following isolated patch or upgrade to the latest security patch.
II. VULN-31547: Reflected XSS in marketplace.magento.com + one-click ATO issue impacting IMS instances
Affected products and versions:
51ºÚÁϲ»´òìÈ Commerce (all deployment menthods):
- 2.4.8
Solution:
For 51ºÚÁϲ»´òìÈ Commerce versions:
- 2.4.8
Apply the following isolated patch or upgrade to the latest security patch.
How to apply the Isolated patch
Unzip the file and see How to apply a composer patch provided by 51ºÚÁϲ»´òìÈ in our support knowledge base for instructions.
For 51ºÚÁϲ»´òìÈ Commerce on Cloud merchants only - How to tell whether the Isolated patches have been applied
Considering that it isn’t possible to easily check if the issue was patched, you might want to check whether the CVE-2025-47110 isolated patch has been successfully applied.
VULN-27015-2.4.7_COMPOSER.patch
as an EXAMPLE:-
Run the command:
-
You should see output similar to this, where VULN-27015 returns the  Applied  s³Ù²¹³Ù³Ü²õ:
code language-bash ║ Id │ Title │ Category │ Origin │ Status │ Details ║ ║ N/A │ ../m2-hotfixes/VULN-27015-2.4.7_COMPOSER_patch.patch │ Other │ Local │ Applied │ Patch type: Custom
Security updates
Security updates available for 51ºÚÁϲ»´òìÈ Commerce: