<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Si vous administrez un shop via magento ⚠️ Une faille critique vise les boutiques en ligne sous Magento et Adobe Commerce.]]></title><description><![CDATA[<p class="quote-inline">RE: <a href="https://infosec.exchange/@_r_netsec/116294764798365020" rel="nofollow noopener"><span>https://</span><span>infosec.exchange/@_r_netsec/11</span><span>6294764798365020</span></a></p><p>Si vous administrez un shop via magento <br /><img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/26a0.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--warning" style="height:23px;width:auto;vertical-align:middle" title="⚠" alt="⚠" />️ Une faille critique vise les boutiques en ligne sous Magento et Adobe Commerce. <br />Elle est déjà exploitée en masse sur internet par des cybercriminels pour compromettre des sites et voler des données bancaires.</p><p>Adobe a publié un correctif dans une version bêta le 10 mars 2026 (version 2.4.9-beta1 <a href="https://experienceleague.adobe.com/en/docs/commerce-operations/release/notes/adobe-commerce/2-4-9?lang=en#highlights-in-v249-beta1" rel="nofollow noopener"><span>https://</span><span>experienceleague.adobe.com/en/</span><span>docs/commerce-operations/release/notes/adobe-commerce/2-4-9?lang=en#highlights-in-v249-beta1</span></a> ) , mais pas encore pour les versions de production. </p><p>En attendant, il faut limiter l’accès au dossier "pub/media/custom_options/" et éventuellement, là ou justifié et possible déployer un pare-feu applicatif réseau ou spécialisé , par ex. Sansec, pour bloquer ces attaques. </p><p><a href="https://infosec.exchange/tags/CyberVeille" rel="tag">#<span>CyberVeille</span></a> <a href="https://infosec.exchange/tags/Magento" rel="tag">#<span>Magento</span></a> <a href="https://infosec.exchange/tags/PolyShell" rel="tag">#<span>PolyShell</span></a> </p><p>(<a href="https://sansec.io/research/magento-polyshell" rel="nofollow noopener"><span>https://</span><span>sansec.io/research/magento-pol</span><span>yshell</span></a>) <br /><img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/1f447.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--point_down" style="height:23px;width:auto;vertical-align:middle" title="👇" alt="👇" /></p>]]></description><link>https://board.circlewithadot.net/topic/75e06e37-0d04-46ff-8e9e-19866ac3548b/si-vous-administrez-un-shop-via-magento-une-faille-critique-vise-les-boutiques-en-ligne-sous-magento-et-adobe-commerce.</link><generator>RSS for Node</generator><lastBuildDate>Sat, 18 Apr 2026 02:42:18 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/75e06e37-0d04-46ff-8e9e-19866ac3548b.rss" rel="self" type="application/rss+xml"/><pubDate>Thu, 26 Mar 2026 13:58:18 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to Si vous administrez un shop via magento ⚠️ Une faille critique vise les boutiques en ligne sous Magento et Adobe Commerce. on Thu, 09 Apr 2026 10:16:23 GMT]]></title><description><![CDATA[<p>"In the early hours of April 7th, nearly 100 Magento stores got mass-infected with a "double-tap" skimmer: a credit card stealer hidden inside an invisible SVG element. Sansec found stolen payment data flowing to six exfiltration domains, five of which are previously unknown. The likely entry vector is the PolyShell vulnerability <strong>that continues to affect unprotected Magento stores.</strong>"<br />[new IoCs inside] <br /><img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/1f447.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--point_down" style="height:23px;width:auto;vertical-align:middle" title="👇" alt="👇" /> <br /><a href="https://sansec.io/research/svg-onload-magecart-skimmer" rel="nofollow noopener"><span>https://</span><span>sansec.io/research/svg-onload-</span><span>magecart-skimmer</span></a></p><p><a href="https://infosec.exchange/tags/CyberVeille" rel="tag">#<span>CyberVeille</span></a> <a href="https://infosec.exchange/tags/magento" rel="tag">#<span>magento</span></a></p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/decio/statuses/116374227071318628</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/decio/statuses/116374227071318628</guid><dc:creator><![CDATA[decio@infosec.exchange]]></dc:creator><pubDate>Thu, 09 Apr 2026 10:16:23 GMT</pubDate></item><item><title><![CDATA[Reply to Si vous administrez un shop via magento ⚠️ Une faille critique vise les boutiques en ligne sous Magento et Adobe Commerce. on Thu, 09 Apr 2026 09:48:05 GMT]]></title><description><![CDATA[<p>"E-commerce : une image SVG est utilisée pour voler les données bancaires"<br /><img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/1f447.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--point_down" style="height:23px;width:auto;vertical-align:middle" title="👇" alt="👇" /> <br /><a href="https://www.it-connect.fr/e-commerce-une-image-svg-est-utilisee-pour-voler-les-donnees-bancaires/" rel="nofollow noopener"><span>https://www.</span><span>it-connect.fr/e-commerce-une-i</span><span>mage-svg-est-utilisee-pour-voler-les-donnees-bancaires/</span></a></p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/decio/statuses/116374115826456582</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/decio/statuses/116374115826456582</guid><dc:creator><![CDATA[decio@infosec.exchange]]></dc:creator><pubDate>Thu, 09 Apr 2026 09:48:05 GMT</pubDate></item></channel></rss>