Vulnerability Description
Magento Long Term Support (LTS) is an unofficial, community-driven project provides an alternative to the Magento Community Edition e-commerce platform with a high level of backward compatibility. Prior to version 20.17.0, the Dataflow module in OpenMage LTS uses a weak blacklist filter (`str_replace('../', '', $input)`) to prevent path traversal attacks. This filter can be bypassed using patterns like `..././` or `....//`, which after the replacement still result in `../`. An authenticated administrator can exploit this to read arbitrary files from the server filesystem. Version 20.17.0 patches the issue.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openmage | Magento | < 20.17.0 |
Related Weaknesses (CWE)
References
- https://github.com/OpenMage/magento-lts/security/advisories/GHSA-6vqf-6fhm-7rc6Vendor AdvisoryExploit
FAQ
What is CVE-2026-25525?
CVE-2026-25525 is a vulnerability with a CVSS score of 4.9 (MEDIUM). Magento Long Term Support (LTS) is an unofficial, community-driven project provides an alternative to the Magento Community Edition e-commerce platform with a high level of backward compatibility. Pri...
How severe is CVE-2026-25525?
CVE-2026-25525 has been rated MEDIUM with a CVSS base score of 4.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-25525?
Check the references section above for vendor advisories and patch information. Affected products include: Openmage Magento.