PatchSiren cyber security CVE debrief
CVE-2026-34653 Adobe CVE debrief
CVE-2026-34653 is a high-severity path traversal issue in Adobe Commerce that can let an authenticated attacker with administrative privileges read or write files outside a restricted directory. Adobe and NVD describe no user interaction requirement and a changed scope impact, which raises the risk of file tampering or sensitive data exposure in affected commerce environments.
- Vendor
- Adobe
- Product
- Commerce
- CVSS
- HIGH 8.7
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-05-12
- Original CVE updated
- 2026-05-20
- Advisory published
- 2026-05-12
- Advisory updated
- 2026-05-20
Who should care
Adobe Commerce administrators, security teams, managed service providers, and operators of stores that depend on Adobe Commerce or the related NVD-listed Adobe Commerce/Magento CPEs should pay attention. The issue matters most where administrative access is broad, where file-based workflows are used, or where secrets, configuration files, or deployment artifacts may be reachable through the affected path handling.
Technical summary
NVD classifies the weakness as CWE-22 (improper limitation of a pathname to a restricted directory). The supplied advisory data says the flaw can allow arbitrary file system read and write outside the intended directory boundary. The CVSS vector is AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N, indicating network reachability, low attack complexity, required high privileges, no user interaction, changed scope, and material confidentiality and integrity impact. The affected versions listed in the source corpus include Adobe Commerce 2.4.9-beta1, 2.4.8-p4, 2.4.7-p9, 2.4.6-p14, 2.4.5-p16, 2.4.4-p17 and earlier, with NVD CPE coverage also referencing related Adobe Commerce B2B and Magento Open Source entries.
Defensive priority
High. The privilege requirement lowers exposure compared with unauthenticated issues, but successful exploitation can still enable sensitive file disclosure or unauthorized file changes with broader impact due to changed scope.
Recommended defensive actions
- Apply Adobe's security update or mitigation guidance from the linked vendor advisory as soon as feasible.
- Prioritize patching internet-facing and production Adobe Commerce instances first, then follow with lower-tier environments.
- Review administrative access paths and reduce the number of users or service accounts with broad Commerce admin privileges.
- Audit file integrity and configuration-sensitive paths for unexpected changes after remediation.
- Monitor for abnormal file access, unexpected writes, or changes in administrative workflows that touch filesystem paths.
- Track dependent Adobe Commerce B2B or Magento Open Source components in the same maintenance cycle if they share the affected code path.
Evidence notes
The source corpus states that Adobe Commerce versions through the listed releases are affected by an improper limitation of a pathname to a restricted directory vulnerability that can result in arbitrary file system read and write. It also states that exploitation requires an authenticated attacker with administrative privileges, needs no user interaction, and changes scope. NVD maps the issue to CWE-22 and includes the Adobe PSIRT advisory as a vendor reference. Published date in the supplied timeline is 2026-05-12, with a modified date of 2026-05-20.
Official resources
-
CVE-2026-34653 CVE record
CVE.org
-
CVE-2026-34653 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Vendor Advisory
The CVE was published on 2026-05-12 and modified on 2026-05-20 in the supplied timeline. NVD references Adobe PSIRT advisory APSB26-49 as the vendor source for mitigation details.