Description
Magento-lts is a long-term support alternative to Magento Community Edition (CE). Prior to version 20.16.1, the admin url can be discovered without prior knowledge of it's location by exploiting the X-Original-Url header on some configurations. This issue has been patched in version 20.16.1.
Published: 2026-02-04
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Information Disclosure – Admin URL Exposure
Action: Immediate Patch
AI Analysis

Impact

The Magento‑lts application contains a flaw that allows an attacker to discover the location of the administration interface by sending requests that include a specific header, X‑Original‑Url. The vulnerability is classified as a confidentiality weakness (CWE‑200). When the header is present, the server can expose or infer the admin‑url path, allowing an unauthenticated user to identify the exact location of a privileged resource.

Affected Systems

Products affected are the OpenMage Long‑Term‑Support edition of Magento. All instances running a version older than 20.16.1 are vulnerable; the patch was applied in 20.16.1 and later releases. The specific admin‑url path is not hard coded and depends on the deployment configuration, but the exposure occurs in all configurations that allow the header to pass through.

Risk and Exploitability

The vulnerability has a CVSS score of 5.3, indicating moderate severity, and an EPSS score of less than 1%, suggesting a very low probability of active exploitation at this time. The ad‑hoc use of a request header does not require any additional privilege, meaning that anyone who can reach the web application can attempt to enumerate the admin path. Although the vulnerability is not currently listed in the CISA KEV catalog, it remains a risk for attackers who may use automated scans to locate the admin interface and then attempt other credential‑guessing or privilege‑bypass attacks.

Generated by OpenCVE AI on April 17, 2026 at 23:11 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the official update to OpenMage magento‑lts version 20.16.1 or later, which removes the vulnerability.
  • Configure the web server or any reverse‑proxy in front of Magento to strip or ignore the X‑Original‑Url header from incoming requests so that an attacker cannot rely on a manipulated header.
  • Continuously monitor access logs for attempts that include X‑Original‑Url or for unusual requests that may indicate that an adversary is trying to discover the admin path.

Generated by OpenCVE AI on April 17, 2026 at 23:11 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-jg68-vhv3-9r8f Magento's X-Original-Url header can expose admin url
History

Fri, 20 Feb 2026 21:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:openmage:magento:*:*:*:*:lts:*:*:*

Thu, 05 Feb 2026 11:45:00 +0000

Type Values Removed Values Added
First Time appeared Openmage
Openmage magento
Vendors & Products Openmage
Openmage magento

Wed, 04 Feb 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 04 Feb 2026 21:30:00 +0000

Type Values Removed Values Added
Description Magento-lts is a long-term support alternative to Magento Community Edition (CE). Prior to version 20.16.1, the admin url can be discovered without prior knowledge of it's location by exploiting the X-Original-Url header on some configurations. This issue has been patched in version 20.16.1.
Title Magento's X-Original-Url header can expose admin url
Weaknesses CWE-200
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}


Subscriptions

Openmage Magento
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-04T21:40:35.514Z

Reserved: 2026-02-02T18:21:42.487Z

Link: CVE-2026-25523

cve-icon Vulnrichment

Updated: 2026-02-04T21:38:07.271Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-04T22:15:59.353

Modified: 2026-02-20T20:57:08.667

Link: CVE-2026-25523

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T23:15:30Z

Weaknesses