Backdoor found in popular ecommerce components

42 mooreds 6 5/11/2025, 1:34:02 PM sansec.io ↗

Comments (6)

BoardsOfCanada · 19h ago
The vendor responses seem pretty strange:

> Magesolution (MGS) did not respond, but the backdoored packages can still be downloaded from their site as of Apr 30th.

> Tigren denies to have been hacked, but the backdoored packages are still available on their site as of Apr 30th.

> Meetanshi claims that their software has not been tampered with, but confirmed that their server got hacked.

pixl97 · 18h ago
Not that strange, unless forced by law vendors will commonly deny all knowledge and responsibility.
xiphias2 · 20h ago
These all look like some Adobe plugin (sold by Adobe store)
GenerocUsername · 20h ago
Thanks. I was skimming article but it seemed like it was missing some critical context
McGlockenshire · 19h ago
> The $licenseFile can be controlled by the attacker using the adminUploadLicense function

This is just as likely to be an RCE as it is to be a backdoor. Calling `include` on a file the user can write to is just asking for it. This has been a known footgun for decades.

blargthorwars · 20h ago
A lot of latent payloads are going to be activated ASAP before automated AI detection becomes the norm. AI ain't perfect, but it's good at this sort of thing.