Blog / Magento PolyShell Vulnerability: What It Is and How to Fix It Fast
March 30, 2026
A recent critical vulnerability affecting all Magento 2 and Adobe Commerce stores was discovered on March 17, 2026. The “Polyshell” vulnerability exploits a flaw in Magento’s REST API, allowing unauthenticated users to access the custom_options and custom_addresses directories and upload malicious files. Without even having valid credentials for the Magento admin or web server, attackers can then execute these files.
As of April 1, 2026, Adobe has not released an official security patch to correct this vulnerability in production environments. Once a server is compromised, sensitive data including payment card information, customer account, and order data are vulnerable. Hackers can also launch additional attacks like encrypting store data, bot attacks, or planting other backdoors for later access.
At CertiPro, our developers worked diligently to implement an immediate but temporary patch to protect our customers by creating a custom validation that blocks execution of code in these malicious files in affected directories. This patch was implemented shortly after the discovery of this issue for CertiPro clients.
We have since completed development of a permanent fix for this vulnerability with a new security patch for our Enhanced Security module. This patch resolves the vulnerability in the web server and entirely blocks bad actors’ access to the vulnerable upload directory, preventing unauthorized access.
If you’re running Magento and need help with our security, contact us to see what our expert team can do for you.
PolyShell is a flaw in Magento’s REST API file upload handling, discovered and named by the eCommerce security firm Sansec. The issue has existed since the earliest Magento 2 releases and impacts both Magento Open Source and Adobe Commerce installations.
The vulnerability allows attackers to upload a specially crafted “polyglot” file—a file that appears to be a harmless image but also contains executable code. Once uploaded, this file can act as a web shell, giving attackers remote access to the server without any login credentials.
Malicious actors can use the PolyShell exploit to inject a malicious payload into vulnerable Magento stores. Once executed, the payload can create a backdoor, allowing attackers to run commands, modify files, or gain persistent access to the server.
Currently all versions of Magento 2 Open Source and Adobe Commerce are exposed to the vulnerability. Adobe has addressed the vulnerability in Magento 2.4.9 pre release branches, but no isolated patch is currently available for production versions such as 2.4.8 and below.
If exploited, the Magento PolyShell vulnerability can lead to several different types of security risks.
These include:
While no official fix has been released by Adobe, our developers have created a patch within our Enhanced Security module to keep our customers as secure as possible. Our security module is part of our Magento Maintenance program offering subscribers security optimization automatically, but CertiPro will be offering this module as an available option for Magento store owners for an added layer of protection.
Additional steps store owners should take are:
Some common signs that your Magento store has been compromised include:
Magento stores handle sensitive customer and payment data. A single vulnerability like PolyShell can result in financial loss, legal exposure, and damage to brand reputation, making proactive security essential.
Yes, we recommend working with expert Magento developers like our team at CertiPro. We can help identify hidden backdoors, ensure complete cleanup, and strengthen your store against future attacks.