Description
Magento Long Term Support (LTS) is an unofficial, community-driven project provides an alternative to the Magento Community Edition e-commerce platform with a high level of backward compatibility. Prior to version 20.17.0, the Dataflow module in OpenMage LTS uses a weak blacklist filter (`str_replace('../', '', $input)`) to prevent path traversal attacks. This filter can be bypassed using patterns like `..././` or `....//`, which after the replacement still result in `../`. An authenticated administrator can exploit this to read arbitrary files from the server filesystem. Version 20.17.0 patches the issue.
Published: 2026-04-20
Score: 4.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary file read via authenticated administrator when path traversal is bypassed
Action: Immediate Patch
AI Analysis

Impact

The Dataflow module in OpenMage LTS before version 20.17.0 applies a weak blacklist filter that removes only the sequence ../ from input. Patterns such as ..././ or ....// still leave a ../ after the replacement, allowing the resolved path to contain traversal. An attacker with administrator credentials can supply these patterns to read any file on the server filesystem. This flaw is a path traversal weakness categorized as CWE-184 and CWE-22 and directly threatens the confidentiality of server files.

Affected Systems

The vulnerability exists in any OpenMage LTS release prior to 20.17.0. All installations of OpenMage:magento-lts running a version earlier than 20.17.0 are affected. OpenMage LTS is an unofficial, community‑driven project providing a long‑term support branch of the Magento Community Edition.

Risk and Exploitability

The CVSS score of 4.9 places this in the medium severity range. EPSS data is not available and the vulnerability is not listed in the CISA KEV catalog, indicating no known widespread exploitation yet. Since the flaw requires authenticated administrator access, only users with such privileges can exploit it, but it gives them unrestricted ability to read any file on the server. The path traversal bypass is straightforward once the attacker knows the weak filter, so the attack vector is local with limited privilege escalation beyond the existing administrator role.

Generated by OpenCVE AI on April 20, 2026 at 18:38 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade OpenMage LTS to version 20.17.0 or newer, which replaces the weak blacklist filter with a robust check that prevents traversal patterns.
  • Limit administrator access by enforcing least privilege and ensuring that only trusted personnel can use the Dataflow module and have filesystem access.
  • If an immediate upgrade is not feasible, apply custom input validation that rejects any path containing .. sequences or multiple sequential slashes before the data is processed by the module, serving as a temporary workaround.

Generated by OpenCVE AI on April 20, 2026 at 18:38 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-6vqf-6fhm-7rc6 OpenMage LTS has a Path Traversal Filter Bypass in Dataflow Module
History

Thu, 23 Apr 2026 18:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:openmage:magento:*:*:*:*:lts:*:*:*

Wed, 22 Apr 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Openmage
Openmage magento
Vendors & Products Openmage
Openmage magento

Tue, 21 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 20 Apr 2026 16:45:00 +0000

Type Values Removed Values Added
Description Magento Long Term Support (LTS) is an unofficial, community-driven project provides an alternative to the Magento Community Edition e-commerce platform with a high level of backward compatibility. Prior to version 20.17.0, the Dataflow module in OpenMage LTS uses a weak blacklist filter (`str_replace('../', '', $input)`) to prevent path traversal attacks. This filter can be bypassed using patterns like `..././` or `....//`, which after the replacement still result in `../`. An authenticated administrator can exploit this to read arbitrary files from the server filesystem. Version 20.17.0 patches the issue.
Title OpenMage LTS has Path Traversal Filter Bypass in Dataflow Module
Weaknesses CWE-184
CWE-22
References
Metrics cvssV3_1

{'score': 4.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Openmage Magento
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-21T13:27:55.707Z

Reserved: 2026-02-02T19:59:47.372Z

Link: CVE-2026-25525

cve-icon Vulnrichment

Updated: 2026-04-21T13:27:19.787Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-20T17:16:32.460

Modified: 2026-04-23T17:47:02.403

Link: CVE-2026-25525

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T11:47:38Z

Weaknesses