The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-47110

CVE-2025-47110: Adobe Commerce Stored XSS Vulnerability

CVE-2025-47110 is a stored Cross-Site Scripting vulnerability in Adobe Commerce that allows high-privileged attackers to inject malicious scripts. This article covers technical details, affected versions, impact, and mitigation.

Updated: January 22, 2026

CVE-2025-47110 Overview

CVE-2025-47110 is a stored Cross-Site Scripting (XSS) vulnerability affecting Adobe Commerce, Adobe Commerce B2B, and Magento Open Source platforms. This vulnerability allows a high-privileged attacker to inject malicious scripts into vulnerable form fields within the application's administrative interface. When other privileged users browse to pages containing the injected malicious content, the JavaScript executes within their browser context, potentially leading to session hijacking, credential theft, and unauthorized administrative actions.

The vulnerability has a changed scope, meaning successful exploitation can impact other high-privileged accounts beyond the initial attack target, resulting in significant confidentiality, integrity, and availability concerns across the affected e-commerce platform.

Critical Impact

High-privileged attackers can inject persistent malicious JavaScript that executes in other administrators' browsers, potentially compromising entire e-commerce operations and customer data.

Affected Products

  • Adobe Commerce versions 2.4.8, 2.4.7-p5, 2.4.6-p10, 2.4.5-p12, 2.4.4-p13 and earlier
  • Adobe Commerce B2B versions 1.5.2, 1.4.2-p5, 1.3.5-p10, 1.3.4-p12, 1.3.3-p13 and earlier
  • Magento Open Source versions 2.4.8, 2.4.7-p5, 2.4.6-p10, 2.4.5-p12 and earlier

Discovery Timeline

  • June 10, 2025 - CVE-2025-47110 published to NVD
  • July 15, 2025 - Last updated in NVD database

Technical Details for CVE-2025-47110

Vulnerability Analysis

This stored XSS vulnerability (CWE-79) resides in form fields within Adobe Commerce's administrative backend. Unlike reflected XSS attacks that require a victim to click a malicious link, stored XSS persists the malicious payload in the application's database. This makes the attack more dangerous as the payload executes automatically whenever an authenticated administrator views the affected page.

The attack requires high privileges to initially inject the malicious content, which provides some barrier to exploitation. However, once injected, the malicious script executes with the permissions of any administrator who views the compromised page. The scope change characteristic means the vulnerability can affect resources beyond the immediate security context, potentially allowing an attacker with limited administrative access to escalate their privileges to those of a super administrator.

Root Cause

The vulnerability stems from insufficient input validation and output encoding in specific form fields within the Adobe Commerce administrative interface. When user-supplied data is stored in the database without proper sanitization and later rendered in HTML pages without adequate output encoding, it creates conditions for stored XSS attacks. The affected form fields fail to properly neutralize potentially malicious script content before it is persisted and subsequently displayed to other users.

Attack Vector

The attack is network-based and requires the attacker to have high-privileged access to the Adobe Commerce administrative panel. The exploitation sequence involves:

  1. An attacker with administrative access navigates to a vulnerable form field within the Commerce admin interface
  2. The attacker injects malicious JavaScript code into the vulnerable field (e.g., product descriptions, CMS content, or configuration fields)
  3. The malicious payload is stored in the application database
  4. When another administrator views the page containing the malicious content, the JavaScript executes in their browser
  5. The executed script can steal session cookies, perform actions as the victim user, or exfiltrate sensitive data

The attack requires user interaction in that a victim must navigate to the compromised page, but no additional clicks or actions are needed for the payload to execute.

Detection Methods for CVE-2025-47110

Indicators of Compromise

  • Unexpected JavaScript code or HTML tags in database fields that typically store plain text or structured content
  • Unusual administrative activity patterns, such as bulk modifications to product descriptions or CMS pages
  • Session anomalies where administrator sessions are accessed from unexpected IP addresses or geographic locations
  • Browser console errors or unexpected script execution warnings in admin panel pages

Detection Strategies

  • Implement Content Security Policy (CSP) headers to detect and report inline script execution attempts in the administrative interface
  • Deploy web application firewall (WAF) rules to monitor for XSS payload patterns in form submissions to admin endpoints
  • Enable comprehensive audit logging for all administrative content modifications, particularly in CMS and product catalog areas
  • Use SentinelOne's application security monitoring to detect anomalous JavaScript execution patterns in browser contexts

Monitoring Recommendations

  • Monitor database content for suspicious script tags, event handlers, and JavaScript URIs using regular expression patterns
  • Review administrative access logs for accounts making bulk content modifications outside normal business patterns
  • Implement real-time alerting for session cookie access or exfiltration attempts from admin pages
  • Configure browser-based telemetry to detect and report unexpected script sources or inline code execution

How to Mitigate CVE-2025-47110

Immediate Actions Required

  • Update Adobe Commerce to the latest patched version as specified in Adobe Security Bulletin APSB25-50
  • Audit all administrative user accounts and remove unnecessary high-privileged access
  • Review recent content modifications in CMS pages, product descriptions, and configuration fields for suspicious code
  • Implement or strengthen Content Security Policy headers to prevent inline script execution

Patch Information

Adobe has released security updates addressing this vulnerability. Organizations should apply the patches detailed in the Adobe Magento Security Update (APSB25-50). The following versions contain the fix:

  • Adobe Commerce 2.4.8-p1 and later
  • Adobe Commerce 2.4.7-p6 and later
  • Adobe Commerce 2.4.6-p11 and later
  • Adobe Commerce 2.4.5-p13 and later
  • Adobe Commerce 2.4.4-p14 and later
  • Corresponding patched versions for Magento Open Source and Commerce B2B

Workarounds

  • Implement strict Content Security Policy headers that disable inline JavaScript execution and restrict script sources to trusted domains
  • Review and restrict administrative access to only essential personnel, following the principle of least privilege
  • Deploy a Web Application Firewall (WAF) with XSS detection rules to filter malicious input before it reaches the application
  • Enable HttpOnly and Secure flags on session cookies to reduce the impact of potential script execution
bash
# Example CSP header configuration for Apache
Header set Content-Security-Policy "default-src 'self'; script-src 'self' https://trusted-cdn.example.com; object-src 'none'; base-uri 'self';"

# Enable HttpOnly and Secure flags for cookies in PHP configuration
# Add to php.ini or .htaccess
php_value session.cookie_httponly 1
php_value session.cookie_secure 1

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeXSS

  • Vendor/TechAdobe Commerce

  • SeverityHIGH

  • CVSS Score8.4

  • EPSS Probability0.09%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityHigh
  • AvailabilityHigh
  • CWE References
  • CWE-79
  • Vendor Resources
  • Adobe Magento Security Update
  • Related CVEs
  • CVE-2026-21284: Adobe Commerce B2b XSS Vulnerability

  • CVE-2026-21290: Adobe Commerce B2B XSS Vulnerability

  • CVE-2026-21291: Adobe Commerce B2B XSS Vulnerability

  • CVE-2026-21292: Adobe Commerce B2B XSS Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English