Skip to content
Tech News
← Back to articles

PolyShell attacks target 56% of all vulnerable Magento stores

read original get Magento Security Patch Kit → more articles
Why This Matters

The widespread exploitation of the PolyShell vulnerability in Magento stores highlights critical security gaps in eCommerce platforms, emphasizing the urgent need for timely patches and robust defenses to protect consumer data and business integrity. The attack's sophistication, including the use of WebRTC-based skimmers, underscores evolving threats that require advanced security measures.

Key Takeaways

Attacks leveraging the ‘PolyShell’ vulnerability in version 2 of Magento Open Source and Adobe Commerce installations are underway, targeting more than half of all vulnerable stores.

According to eCommerce security company Sansec, hackers started exploiting the critical PolyShell issue en masse last week, just two days after public disclosure.

“Mass exploitation of PolyShell started on March 19th, and Sansec has now found PolyShell attacks on 56.7% of all vulnerable stores,” Sansec says.

The researchers previously reported that the problem lies in Magento’s REST API, which accepts file uploads as part of the custom options for the cart item, allowing polyglot files to achieve remote code execution or account takeover via stored cross-site scripting (XSS), if the web server configuration allows it.

Adobe released a fix in version 2.4.9-beta1 on March 10, 2026, but it has not yet reached the stable branch. BleepingComputer previously contacted Adobe to ask about when a security update addressing PolyShell will become available for production versions, but we have not received a response.

Meanwhile, Sansec has published a list of IP addresses that target scanning for web stores vulnerable to PolyShell.

WebRTC skimmer

Sansec reports that in some of the attacks suspected to exploit PolyShell, the threat actor delivers a novel payment card skimmer that uses Web Real-Time Communication (WebRTC) to exfiltrates data.

WebRTC uses DTLS-encrypted UDP rather than HTTP, so it is more likely to evade security controls even on sites with strict Content Security Policy (CSP) controls like "connect-src."

The skimmer is a lightweight JavaScript loader that connects to a hardcoded command-and-control (C2) server via WebRTC, bypassing normal signaling by embedding a forged SDP exchange.

... continue reading