Advisory Database
  • Advisories
  • Dependency Scanning
  1. composer
  2. ›
  3. openmage/magento-lts
  4. ›
  5. CVE-2026-25524

CVE-2026-25524: OpenMage LTS: Phar Deserialization leads to Remote Code Execution

April 21, 2026

PHP functions such as getimagesize(), file_exists(), and is_readable() can trigger deserialization when processing phar:// stream wrapper paths. OpenMage LTS uses these functions with potentially controllable file paths during image validation and media handling. An attacker who can upload a malicious phar file (disguised as an image) and trigger one of these functions with a phar:// path can achieve arbitrary code execution.

MetricValueJustification
Attack Vector (AV)NetworkExploitable via file upload and web requests
Attack Complexity (AC)HighRequires file upload + triggering phar:// access
Privileges Required (PR)NoneSome upload vectors don’t require authentication
User Interaction (UI)NoneExploitation is automatic once triggered
Scope (S)UnchangedImpacts the vulnerable component
Confidentiality (C)HighFull system access via RCE
Integrity (I)HighArbitrary code execution
Availability (A)HighComplete system compromise possible

References

  • github.com/OpenMage/magento-lts
  • github.com/OpenMage/magento-lts/releases/tag/v20.17.0
  • github.com/OpenMage/magento-lts/security/advisories/GHSA-fg79-cr9c-7369
  • github.com/advisories/GHSA-fg79-cr9c-7369
  • nvd.nist.gov/vuln/detail/CVE-2026-25524

Code Behaviors & Features

Detect and mitigate CVE-2026-25524 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 20.17.0

Fixed versions

  • 20.17.0

Solution

Upgrade to version 20.17.0 or above.

Impact 8.1 HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-502: Deserialization of Untrusted Data

Source file

packagist/openmage/magento-lts/CVE-2026-25524.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 12:18:53 +0000.