

<?xml version="1.0" encoding="UTF-8"?>
	<rss version="2.0"
		xmlns:content="http://purl.org/rss/1.0/modules/content/"
		xmlns:wfw="http://wellformedweb.org/CommentAPI/"
		xmlns:dc="http://purl.org/dc/elements/1.1/"
		xmlns:atom="http://www.w3.org/2005/Atom"

			>

	<channel>
		<title>LexiConn News  &#187;  Topic: Magento Vulnerability in the Wild &#8211; All LexiConn Clients Patched</title>
		<atom:link href="https://support.lexiconn.com/news/forums/topic/magento-vulnerability-in-the-wild-all-lexiconn-clients-patched/feed" rel="self" type="application/rss+xml" />
		<link>https://support.lexiconn.com/news/forums/topic/magento-vulnerability-in-the-wild-all-lexiconn-clients-patched/feed</link>
		<description></description>
		<pubDate>Sun, 05 Apr 2026 04:27:34 +0000</pubDate>
		<generator>http://bbpress.org/?v=2.5.3-5249</generator>
		<language>en-US</language>

		
														
					
				<item>
					<guid>https://support.lexiconn.com/news/forums/topic/magento-vulnerability-in-the-wild-all-lexiconn-clients-patched/#post-49119</guid>
					<title><![CDATA[Magento Vulnerability in the Wild &#8211; All LexiConn Clients Patched]]></title>
					<link>https://support.lexiconn.com/news/forums/topic/magento-vulnerability-in-the-wild-all-lexiconn-clients-patched/#post-49119</link>
					<pubDate>Fri, 24 Apr 2015 01:15:26 +0000</pubDate>
					<dc:creator>lexiconn</dc:creator>

					<description>
						<![CDATA[
						<p>Back in February, we<strong><a href="http://support.lexiconn.com/news/forums/topic/all-hosted-magento-stores-patched-with-latest-supee-5344-security-vulnerability/" rel="nofollow"> announced a Magento Patch</a></strong> that we applied to all Magento merchants hosted with us. We applied Patch SUPEE-5344 (and the previous 1533 to older stores) right after Magento made it available. At the time, this was only a theoretical vulnerability.</p>
<p>This week, both a <strong><a href="http://blog.checkpoint.com/2015/04/20/analyzing-magento-vulnerability/" target="_blank" rel="nofollow">detailed breakdown of the vulnerability</a></strong> was published, and then <strong><a href="https://blog.sucuri.net/2015/04/magento-shoplift-supee-5344-exploits-in-the-wild.html" target="_blank" rel="nofollow">Sucuri reported</a></strong> that they are seeing active hacks on Magento stores not patched.</p>
<p>If you&#8217;re not hosted with LexiConn, and you&#8217;re running a Magento store, it is *CRITICAL* that you patch against this vulnerability now if you haven&#8217;t already.</p>
<p>If you&#8217;re hosted with us, your Magento store is safe against this attack.</p>
<p>If you have any questions about your Magento store&#8217;s status, let us know.</p>
<p>- LexiConn Support</p>
<p>&nbsp;</p>
						]]>
					</description>

					
					
				</item>

					
		
	</channel>
	</rss>

