Security-minded for Magento 2

Run a Magento security assessment with
Magebean­-CLI

Magebean-CLI assesses your Magento store in minutes to identify weak or missing controls, to know exactly what to fix — and why — ideal for weekly drift monitoring and maintenance workflows.

It’s aligned with OWASP guidance and tailored specifically for Magento 2.

Magento 2 CI-friendly Read-only Scanner Friendly Support
Example command

$ ./magebean.phar scan --path=/var/www/magento \
  --format=html \
  --output=report.html \
  --detail
# One command, clean answer.

            

The Security Baseline for Magento 2

The baseline defines what “right” looks like — the known-good state where versions, config, and access are aligned in the right order.

But with time, every system drifts.
Audit exists to see how far reality has moved from the baseline.

Once you can see the drift, you can restore the order.

Magebean CLI

$ ./magebean.phar scan \
        --path=/var/www/magento \
        --format=html --output=report.html

Magebean Security Audit v1.0                Target: /var/www/magento
Time: 2026-02-03 11:55:02    PHP: 8.2    Env: prod

⚠ CVE check skipped
   → Requires CVE Bundle (--cve-data=magebean-known-cve-data-202602.zip)
   → Visit https://magebean.com/magebean-cli

Findings (5)

[CRITICAL] Magento core outdated — detected 2.4.3, latest 2.4.7-p1
[HIGH]    Admin route is default (/admin)
[HIGH]    Admin 2FA disabled
[MEDIUM]  Folder permission /pub/media is 777
[MEDIUM]  Full Page Cache disabled/misconfigured

Summary
Passed Rules: 76 / 81
Issues: 1 Critical, 2 High, 2 Medium

→ Report saved to report.html
Contact: support@magebean.com