CVE-2026-25524

🟡 Monitoruj

Wykorzystanie funkcji PHP w OpenMage LTS umożliwia zdalne wykonanie kodu przez złośliwy plik.

CVSS
8.1
EPSS
0.1%
Exploit
none
Vendor
Opis źródłowy (NVD)

Magento Long Term Support (LTS) is an unofficial, community-driven project provides an alternative to the Magento Community Edition e-commerce platform with a high level of backward compatibility. Prior to version 20.17.0, PHP functions such as `getimagesize()`, `file_exists()`, and `is_readable()` can trigger deserialization when processing `phar://` stream wrapper paths. OpenMage LTS uses these functions with potentially controllable file paths during image validation and media handling. An attacker who can upload a malicious phar file (disguised as an image) and trigger one of these functions with a `phar://` path can achieve arbitrary code execution. Version 20.17.0 patches the issue.

deserialization rce Brak patcha
Źródła i daty
ŹródłoWartość
NVD – CVSS8.1
CISA KEV (aktywnie wykorzystywane)Nie
FIRST EPSS (prawdopodobieństwo exploita)0.1%
Opublikowano (NVD)2026-04-20 17:16:32 UTC
Ostatnia modyfikacja (NVD)2026-04-20 19:03:07 UTC
Referencje