Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-3j5q-7q7h-2hhv | OpenMage LTS: Customer File Upload Extension Blocklist Bypass → Remote Code Execution |
Thu, 23 Apr 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:openmage:magento:*:*:*:*:lts:*:*:* | |
| Metrics |
cvssV3_1
|
Wed, 22 Apr 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Openmage
Openmage magento |
|
| Vendors & Products |
Openmage
Openmage magento |
Mon, 20 Apr 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 20 Apr 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Magento Long Term Support (LTS) is an unofficial, community-driven project provides an alternative to the Magento Community Edition e-commerce platform with a high level of backward compatibility. Prior to version 20.17.0, the product custom option file upload in OpenMage LTS uses an incomplete blocklist (`forbidden_extensions = php,exe`) to prevent dangerous file uploads. This blocklist can be trivially bypassed by using alternative PHP-executable extensions such as `.phtml`, `.phar`, `.php3`, `.php4`, `.php5`, `.php7`, and `.pht`. Files are stored in the publicly accessible `media/custom_options/quote/` directory, which lacks server-side execution restrictions for some configurations, enabling Remote Code Execution if this directory is not explicitly denied script execution. Version 20.17.0 patches the issue. | |
| Title | OpenMage LTS has Customer File Upload Extension Blocklist Bypass that Leads to Remote Code Execution | |
| Weaknesses | CWE-434 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-20T16:55:05.724Z
Reserved: 2026-04-13T19:50:42.114Z
Link: CVE-2026-40488
Updated: 2026-04-20T16:44:21.310Z
Status : Analyzed
Published: 2026-04-20T17:16:36.300
Modified: 2026-04-23T17:45:16.180
Link: CVE-2026-40488
No data.
OpenCVE Enrichment
Updated: 2026-04-22T11:47:34Z
Github GHSA