OpenMage LTS Vulnerability Allows Arbitrary Code Execution via Phar Files

OpenMage LTS Vulnerability Allows Arbitrary Code Execution via Phar Files

The National Vulnerability Database has identified a critical vulnerability (CVE-2026-25524) in OpenMage LTS, an unofficial community fork of Magento. Versions prior to 20.17.0 are susceptible to arbitrary code execution. This is achieved by exploiting PHP’s phar:// stream wrapper when processing uploaded files, such as images. Functions like getimagesize(), file_exists(), and is_readable() can be tricked into deserializing malicious PHAR archives disguised as image files during validation or media handling.

The attacker’s calculus here is straightforward: gain initial access by uploading a crafted PHAR file, then trigger the vulnerable functions. This bypasses typical image validation and directly leads to code execution on the server. The CVSS score of 8.1 (HIGH) underscores the severity, with the vector indicating network-accessible exploitation with minimal prerequisites (no authentication, low complexity) and high impact across confidentiality, integrity, and availability.

Defenders must prioritize patching OpenMage LTS installations to version 20.17.0 or later immediately. For organizations unable to patch, strict input validation on all file uploads is paramount, specifically scrutinizing file types and contents for signs of PHAR archives. Monitoring file system access logs for suspicious phar:// wrapper usage can also aid in early detection of exploitation attempts.

What This Means For You

  • If your organization uses OpenMage LTS, check your current version and patch to 20.17.0 or higher immediately. If patching is not feasible, audit your file upload mechanisms for robust validation against PHAR files and monitor logs for `phar://` stream usage.

Related ATT&CK Techniques

🛡️ Detection Rules

3 rules · 6 SIEM formats

3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.

critical T1190 Initial Access

OpenMage LTS Arbitrary Code Execution via Phar Upload - CVE-2026-25524

Sigma YAML — free preview
✓ Sigma · Splunk SPL Sentinel KQL Elastic QRadar AQL Wazuh Export via Bot →

Indicators of Compromise

IDTypeIndicator
CVE-2026-25524 Vulnerability CVE-2026-25524
Source & Attribution
Source PlatformNVD
ChannelNational Vulnerability Database
PublishedApril 20, 2026 at 20:16 UTC

This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.

Believe this infringes your rights? Submit a takedown request.

Related Posts

CVE-2026-41389 — OpenClaw versions 2026.4.7 before 2026.4.15 fail to enforce

CVE-2026-41389 — OpenClaw versions 2026.4.7 before 2026.4.15 fail to enforce local-root containment on tool-result media paths, allowing arbitrary local and UNC file access. Attackers can...

vulnerabilityCVEmedium-severitycwe-73
/SCW Vulnerability Desk /MEDIUM /5.8 /⚑ 2 IOCs /⚙ 3 Sigma

CVE-2026-39112 — Cross Site Scripting vulnerability in Apartment Visitors

CVE-2026-39112 — Cross Site Scripting vulnerability in Apartment Visitors Management System Apartment Visitors Management System V1.1 in the visname parameter of visitors-form.php. An authenticated attacker...

vulnerabilityCVEmedium-severitycwe-79
/SCW Vulnerability Desk /MEDIUM /5.4 /⚑ 2 IOCs /⚙ 3 Sigma

Unauthenticated SQLi in Apartment Visitors Management System

CVE-2026-39111 — SQL Injection vulnerability in Apartment Visitors Management System Apartment Visitors Management System V1.1 in the email parameter of the forgot password page (forgot-password.php)....

vulnerabilityCVEhigh-severitysql-injectioncwe-89
/SCW Vulnerability Desk /HIGH /7.5 /⚑ 3 IOCs /⚙ 3 Sigma