Magento Commerce - RCE (CVE-2022-24086)
5Exploiting IPs reported
Adobe Commerce versions 2.4.3-p1 (and earlier) and 2.3.7-p2 (and earlier) are affected by an improper input validation vulnerability during the checkout process. Exploitation of this issue does not require user interaction and could result in arbitrary code execution.
CrowdSec analysis
CVE-2022-24086 is a critical improper input validation vulnerability in Adobe Commerce (Magento Commerce) that affects the checkout process. This flaw allows remote attackers to execute arbitrary code on the server without requiring any user interaction, potentially leading to full system compromise and enabling a range of attacks such as data theft, site defacement, or malware deployment.
CrowdSec has been tracking this vulnerability and its exploits since 29th of October 2025.
CrowdSec network data shows that most actors exploiting CVE-2022-24086 rely on broad, untargeted scans with minimal filtering. The activity is largely automated and opportunistic in nature. In addition, according to the CrowdSec network, attack volume against CVE-2022-24086 has dipped slightly compared to the previous week. Although still commonly targeted, the decline suggests a cooling-off period. Long-term relevance remains, but attention is waning.
Attackers exploit the Adobe Commerce (Magento) checkout and payment API endpoints, particularly targeting /rest/default/V1/guest-carts/<entity_id>/shipping-information and /rest/default/V1/guest-carts/<entity_id>/payment-information, injecting malicious payloads in JSON fields to achieve remote code execution. These attempts often include suspicious template filter expressions or system command patterns within the firstname or lastname fields.
Exploitation
Get real-time information about exploitation attempts and actors involved.
Protection
Find out relevant information to protect your stack against this CVE.
Blocklist
With our advanced worldwide network detection, CrowdSec can provide a list of IPs known for exploiting the vulnerability.
To increase your protection against this CVE, block exploitation attempts with this list of identified actors.