CVE-2026-25524
Wykorzystanie funkcji PHP w OpenMage LTS umożliwia zdalne wykonanie kodu przez złośliwy plik.
Magento Long Term Support (LTS) is an unofficial, community-driven project provides an alternative to the Magento Community Edition e-commerce platform with a high level of backward compatibility. Prior to version 20.17.0, PHP functions such as `getimagesize()`, `file_exists()`, and `is_readable()` can trigger deserialization when processing `phar://` stream wrapper paths. OpenMage LTS uses these functions with potentially controllable file paths during image validation and media handling. An attacker who can upload a malicious phar file (disguised as an image) and trigger one of these functions with a `phar://` path can achieve arbitrary code execution. Version 20.17.0 patches the issue.
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 8.1 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 0.1% |
| Opublikowano (NVD) | 2026-04-20 17:16:32 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-20 19:03:07 UTC |
- https://github.com/OpenMage/magento-lts/releases/tag/v20.17.0 (security-advisories@github.com)
- https://github.com/OpenMage/magento-lts/security/advisories/GHSA-fg79-cr9c-7369 (security-advisories@github.com)