CVE-2023-29297

9.1 CRITICAL

📋 TL;DR

This vulnerability allows authenticated admin users in Adobe Commerce to execute arbitrary code through improper template engine neutralization. It affects Adobe Commerce versions 2.4.6 and earlier, 2.4.5-p2 and earlier, and 2.4.4-p3 and earlier. No user interaction is required for exploitation.

💻 Affected Systems

Products:
  • Adobe Commerce
  • Magento Open Source
Versions: 2.4.6 and earlier, 2.4.5-p2 and earlier, 2.4.4-p3 and earlier
Operating Systems: All platforms running affected Adobe Commerce versions
Default Config Vulnerable: ⚠️ Yes
Notes: Requires admin authentication but no special configuration needed

📦 What is this software?

Magento by Adobe

Magento (now Adobe Commerce) is a leading open-source e-commerce platform powering hundreds of thousands of online stores worldwide, processing billions in transactions across B2C, B2B, and marketplace models. Used by brands including Nike, Ford, Coca-Cola, Olympus, and thousands of mid-market retai...

Learn more about Magento →

Magento by Adobe

Magento (now Adobe Commerce) is a leading open-source e-commerce platform powering hundreds of thousands of online stores worldwide, processing billions in transactions across B2C, B2B, and marketplace models. Used by brands including Nike, Ford, Coca-Cola, Olympus, and thousands of mid-market retai...

Learn more about Magento →

Magento by Adobe

Magento (now Adobe Commerce) is a leading open-source e-commerce platform powering hundreds of thousands of online stores worldwide, processing billions in transactions across B2C, B2B, and marketplace models. Used by brands including Nike, Ford, Coca-Cola, Olympus, and thousands of mid-market retai...

Learn more about Magento →

Magento by Adobe

Magento (now Adobe Commerce) is a leading open-source e-commerce platform powering hundreds of thousands of online stores worldwide, processing billions in transactions across B2C, B2B, and marketplace models. Used by brands including Nike, Ford, Coca-Cola, Olympus, and thousands of mid-market retai...

Learn more about Magento →

Magento by Adobe

Magento (now Adobe Commerce) is a leading open-source e-commerce platform powering hundreds of thousands of online stores worldwide, processing billions in transactions across B2C, B2B, and marketplace models. Used by brands including Nike, Ford, Coca-Cola, Olympus, and thousands of mid-market retai...

Learn more about Magento →

Magento by Adobe

Magento (now Adobe Commerce) is a leading open-source e-commerce platform powering hundreds of thousands of online stores worldwide, processing billions in transactions across B2C, B2B, and marketplace models. Used by brands including Nike, Ford, Coca-Cola, Olympus, and thousands of mid-market retai...

Learn more about Magento →

Magento by Adobe

Magento (now Adobe Commerce) is a leading open-source e-commerce platform powering hundreds of thousands of online stores worldwide, processing billions in transactions across B2C, B2B, and marketplace models. Used by brands including Nike, Ford, Coca-Cola, Olympus, and thousands of mid-market retai...

Learn more about Magento →

Magento by Adobe

Magento (now Adobe Commerce) is a leading open-source e-commerce platform powering hundreds of thousands of online stores worldwide, processing billions in transactions across B2C, B2B, and marketplace models. Used by brands including Nike, Ford, Coca-Cola, Olympus, and thousands of mid-market retai...

Learn more about Magento →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with admin privileges leading to data theft, ransomware deployment, or persistent backdoor installation.

🟠

Likely Case

Unauthorized code execution allowing data exfiltration, privilege escalation, or lateral movement within the environment.

🟢

If Mitigated

Limited impact if proper access controls restrict admin privileges and network segmentation is implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires admin privileges but is straightforward once authenticated

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.4.6-p1, 2.4.5-p3, 2.4.4-p4

Vendor Advisory: https://helpx.adobe.com/security/products/magento/apsb23-35.html

Restart Required: Yes

Instructions:

1. Backup your Adobe Commerce instance. 2. Apply the security patch from the vendor advisory. 3. Clear cache and restart services. 4. Verify the patch is applied correctly.

🔧 Temporary Workarounds

Restrict Admin Access

all

Limit admin panel access to trusted IP addresses only

Configure web server (Apache/Nginx) to restrict access to /admin path

Implement Multi-Factor Authentication

all

Require MFA for all admin accounts to reduce risk of credential compromise

Install and configure MFA extension for Adobe Commerce

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Adobe Commerce instances
  • Enforce principle of least privilege for all admin accounts and monitor for suspicious activity

🔍 How to Verify

Check if Vulnerable:

Check Adobe Commerce version via admin panel or by examining composer.json file

Check Version:

php bin/magento --version

Verify Fix Applied:

Verify version is updated to 2.4.6-p1, 2.4.5-p3, or 2.4.4-p4

📡 Detection & Monitoring

Log Indicators:

  • Unusual admin login patterns
  • Suspicious template modification activities
  • Unexpected PHP process execution

Network Indicators:

  • Unusual outbound connections from Adobe Commerce server
  • Unexpected file uploads to admin interface

SIEM Query:

source="adobe_commerce_logs" AND (event="admin_login" OR event="template_modify")

🔗 References

📤 Share & Export