Adobe Security Bulletin

Security update available for Adobe Commerce | APSB26-49

Bulletin ID

Date Published

Priority

APSB26-49

May 12, 2026

2

Summary

Adobe has released a security update for Adobe Commerce and Magento Open Source. This update resolves criticalimportant and moderate vulnerabilities.  Successful exploitation could lead to arbitrary code execution, arbitrary file system write, application denial-of-service, and security feature bypass.

Adobe is not aware of any exploits in the wild for any of the issues addressed in these updates.

Affected Versions

Product Version Priority Rating Platform
 Adobe Commerce

2.4.9-beta1

2.4.8-p4 and earlier

2.4.7-p9 and earlier

2.4.6-p14 and earlier

2.4.5-p16 and earlier

2.4.4-p17 and earlier

2 All
Adobe Commerce B2B

1.5.3-beta1

1.5.2-p4 and earlier

1.4.2-p9 and earlier

1.3.4-p16 and earlier

1.3.3-p17 and earlier

2 All
Magento Open Source

2.4.9-beta1

2.4.8-p4 and earlier

2.4.7-p9 and earlier

2.4.6-p14 and earlier

2 All

Solution

Adobe categorizes these updates with the following priority ratings and recommends users update their installation to the newest version.

Product Updated Version Platform Priority Rating Installation Instructions
Adobe Commerce

2.4.9

2.4.8-p5

2.4.7-p10

2.4.6-p15

2.4.5-p17

2.4.4-p18

All 2 2.4.x Release Notes
Adobe Commerce B2B

1.5.3

1.5.2-p5

1.4.2-p10

1.3.4-p17

1.3.3-p18

All 2 2.4.x Release Notes
Magento Open Source

2.4.9

2.4.8-p5

2.4.7-p10

2.4.6-p15

All 2 2.4.x Release Notes

Adobe categorizes these updates with the following priority ratings and recommends users update their installation to the newest version.

Vulnerability Details

Vulnerability Category Vulnerability Impact Severity Authentication required to exploit? Exploit requires admin privileges?
CVSS base score
CVSS vector
CVE number(s) Notes
Incorrect Authorization (CWE-863) Security feature bypass Critical Yes Yes 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N CVE-2026-34645  
Incorrect Authorization (CWE-863) Security feature bypass Critical Yes Yes 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N CVE-2026-34646  
Server-Side Request Forgery (SSRF) (CWE-918) Security feature bypass Critical Yes Yes 7.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N CVE-2026-34647  
Uncontrolled Resource Consumption (CWE-400) Application denial-of-service Critical Yes No 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVE-2026-34648  
Uncontrolled Resource Consumption (CWE-400) Application denial-of-service Critical Yes No 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVE-2026-34649  
Uncontrolled Resource Consumption (CWE-400) Application denial-of-service Critical Yes No 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVE-2026-34650  
Uncontrolled Resource Consumption (CWE-400) Application denial-of-service Critical Yes No 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVE-2026-34651  
Dependency on Vulnerable Third-Party Component (CWE-1395) Application denial-of-service Critical Yes No 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVE-2026-34652  
Cross-site Scripting (Stored XSS) (CWE-79) Arbitrary code execution Critical Yes Yes 8.7 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N CVE-2026-34686  
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (CWE-22) Arbitrary file system write Critical Yes Yes 8.7 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N CVE-2026-34653  
Dependency on Vulnerable Third-Party Component (CWE-1395) Application denial-of-service Important Yes No 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L CVE-2026-34654  
Cross-site Scripting (Stored XSS) (CWE-79) Arbitrary code execution Important Yes Yes 4.8 CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N CVE-2026-34655  
Improper Authorization (CWE-285) Security feature bypass important Yes No 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N CVE-2026-34656  
Cross-site Scripting (Stored XSS) (CWE-79) Arbitrary code execution Important Yes Yes 4.8 CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N CVE-2026-34658  
Improper Input Validation (CWE-20) Arbitrary code execution Moderate Yes Yes 3.4 CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:N/I:L/A:N CVE-2026-34685  
Note

Authentication required to exploit: The vulnerability is (or is not) exploitable without credentials.


Exploit requires admin privileges: The vulnerability is (or is not) only exploitable by an attacker with administrative privileges.

Acknowledgements

Adobe would like to thank the following researchers for reporting these issues and working with Adobe to help protect our customers:

  • thlassche -- CVE-2026-34645, CVE-2026-34646, CVE-2026-34656
  • 0x0doteth -- CVE-2026-34647
  • bau1u -- CVE-2026-34648, CVE-2026-34649, CVE-2026-34650, CVE-2026-34651
  • wash0ut -- CVE-2026-34652
  • rez0 -- CVE-2026-34653

  • akouba -- CVE-2026-34654
  • srcoder -- CVE-2026-34655

  • schemonah -- CVE-2026-34658
  • truff -- CVE-2026-34685
  • Ray Wolf (raywolfmaster) -- CVE-2026-34686

NOTE: Adobe has a public bug bounty program with HackerOne. If you are interested in working with Adobe as an external security researcher, please check out https://hackerone.com/adobe.


For more information, visit https://helpx.adobe.com/security.html, or email PSIRT@adobe.com.

Adobe, Inc.

Get help faster and easier

New user?