CrowdSec
10/10CrowdSec Score

Magento Commerce - RCE (CVE-2022-24086)

Published on16-02-2022
First seen on06-11-2025

4Exploiting IPs reported

Adobe Commerce versions 2.4.3-p1 (and earlier) and 2.3.7-p2 (and earlier) are affected by an improper input validation vulnerability during the checkout process. Exploitation of this issue does not require user interaction and could result in arbitrary code execution.

CrowdSec analysis

CVE-2022-24086 is a critical improper input validation vulnerability in Adobe Commerce (Magento Commerce) that affects the checkout process. This flaw allows remote attackers to execute arbitrary code on the server without requiring any user interaction, potentially leading to full system compromise and enabling a range of attacks such as data theft, site defacement, or malware deployment.

CrowdSec has been tracking this vulnerability and its exploits since 29th of October 2025.

Data from the CrowdSec community indicates that exploitation of CVE-2022-24086 is highly selective and intelligence-driven. Threat actors use advanced reconnaissance and carefully choose their targets, often as part of sophisticated campaigns or advanced persistent threat operations. Additionally, according to week-over-week analysis by CrowdSec, exploitation of CVE-2022-24086 is surging. Attack volumes are spiking well above historical norms, indicating widespread and escalating interest from threat actors. CVE-2022-24086 is currently experiencing high visibility and active exploitation across the internet.

Attackers exploit the Adobe Commerce (Magento) checkout and payment API endpoints, particularly targeting /rest/default/V1/guest-carts/<entity_id>/shipping-information and /rest/default/V1/guest-carts/<entity_id>/payment-information, injecting malicious payloads in JSON fields to achieve remote code execution. These attempts often include suspicious template filter expressions or system command patterns within the firstname or lastname fields.

Exploitation

Get real-time information about exploitation attempts and actors involved.

Detected IPs

Discover the IPs that targeted this vulnerability across the CrowdSec Network.

Protection

Find out relevant information to protect your stack against this CVE.

Blocklist

With our advanced worldwide network detection, CrowdSec can provide a list of IPs known for exploiting the vulnerability.

To increase your protection against this CVE, block exploitation attempts with this list of identified actors.