Release notes for Adobe Commerce 2.4.8 security patches
These security patch release notes capture updates to enhance the security of your Adobe Commerce deployment. Information includes, but is not limited to, the following:
- Security bug fixes
- Security highlights that provide more detail about enhancements and updates included in the security patch
- Known issues
- Instructions to apply additional patches if required
- Information about any hot fixes included in the release
Learn more about security patch releases:
- Adobe Commerce Security Patch Releases overview
- Instructions for downloading and applying security patch releases are available in the How to obtain and apply security patches in the Adobe Commerce Knowledgebase.
2.4.8-p3
The Adobe Commerce 2.4.8-p3 security release provides security bug fixes for vulnerabilities identified in previous releases of 2.4.8.
For the latest information about the security bug fixes, see Adobe Security Bulletin APSB25-94.
Highlights
This release includes the following highlights:
-
Fix for CVE-2025-54236 to resolve a REST API vulnerability. Adobe released a hotfix for this issue in September 2025. See the Action required: Critical Security Update Available for Adobe Commerce (APSB25-88) Knowledge Base article for details.
-
Developers must review REST API constructor parameter validation to learn how to update extensions to be compliant with these security changes.
-
Fix for ACP2E-3874: The REST API response for order details now contains correct values for
base_row_totalandrow_totalattributes in case when several same items were ordered. -
Fix for AC-15446: Fixed an error in
Magento\Framework\Mail\EmailMessagewheregetBodyText()attempted to call a non-existentgetTextBody()method onSymfony\Component\Mime\Message, ensuring compatibility with Magento 2.4.8-p2 andmagento/framework103.0.8-p2. -
Migrate from TinyMCE to Hugerte.org
Due to the end of support for TinyMCE 5 and 6 and licensing incompatibilities with TinyMCE 7, The current implementation of Adobe Commerce WYSIWYG editor is migrated from TinyMCE to the open-source HugeRTE editor.
This migration ensures Adobe Commerce remains compliant with open-source licensing, avoids known TinyMCE 6 vulnerabilities, and delivers a modern, supported editing experience for merchants and developers.
-
Added support for Apache ActiveMQ Artemis STOMP protocol
Added support for the ActiveMQ Artemis open-source message broker through the Simple Text Oriented Messaging Protocol (STOMP). It delivers a reliable and scalable messaging system, offering flexibility for STOMP-based integrations. See Apache ActiveMQ Artemis in the Commerce Configuration Guide.
Known issues
Checkout page fails to load static.min.js and mixins.min.js
After recent CSP/SRI changes, the checkout page does not load static.min.js and mixins.min.js when JavaScript bundling and minification are both enabled in production mode. As a result, RequireJS mixins do not run, and checkout Knockout templates fail to resolve (for example, "Failed to load the 'Magento_Checkout/shipping' template requested by 'checkout.steps.shipping-step.shippingAddress'").
Workaround:
- Disable JavaScript bundling; or
- If you keep JavaScript bundling enabled, disable JavaScript minification.
Hotfix:
A hotfix addressing this issue will be released as soon as possible. Please monitor this release notes page for updates.
2.4.8-p2
The Adobe Commerce 2.4.8-p2 security release provides security bug fixes for vulnerabilities identified in previous releases of 2.4.8.
For the latest information about the security bug fixes, see Adobe Security Bulletin APSB25-71.
2.4.8-p1
The Adobe Commerce 2.4.8-p1 security release provides security bug fixes for vulnerabilities identified in previous releases of 2.4.8.
For the latest information about the security bug fixes, see Adobe Security Bulletin APSB25-50.
Highlights
This release includes the following highlights:
-
API performance enhancement—Resolves performance degradation in bulk asynchronous web API endpoints that were introduced after the previous security patch.
-
CMS Blocks access fix—Resolves an issue where Admin users with restricted permissions (such as merchandising-only access) were unable to view the CMS Blocks listing page.
Previously, these users encountered an error due to missing configuration parameters after installing previous security patches.
-
Cookie limit compatibility—Resolves a backward-incompatible change involving the
MAX_NUM_COOKIESconstant in the framework. This update restores expected behavior and ensures compatibility for extensions or customizations that interact with cookie limits. -
Async operations—Restricted async operations for overriding previous customers orders.
-
Fix for CVE-2025-47110—Resolves an email templates vulnerability.
-
Fix for VULN-31547—Resolves a category canonical link vulnerability.
The fixes for CVE-2025-47110 and VULN-31547 are also available as an isolated patch. See the Knowledge Base article for details.