Magento's X-Original-Url header can expose admin url
Description
Magento-lts is a long-term support alternative to Magento Community Edition (CE). Prior to version 20.16.1, the admin url can be discovered without prior knowledge of it's location by exploiting the X-Original-Url header on some configurations. This issue has been patched in version 20.16.1.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Magento-lts prior to 20.16.1 allows attackers to discover the admin URL by exploiting the X-Original-Url header on some configurations, bypassing admin panel obscurity.
Vulnerability
Overview
Magento-lts, a long-term support alternative to Magento Community Edition, contains an information disclosure vulnerability in versions prior to 20.16.1. The bug arises from the processing of the X-Original-Url header by the Zend framework library, which can inadvertently reveal the admin URL on certain web server configurations. An attacker sends a crafted request with this header, and due to improper sanitization, the server may respond with the admin path in the response headers or error messages, allowing discovery of a normally hidden URL. [1][3]
Exploitation
No authentication is required; any publicly accessible Magento-lts instance using affected configurations is vulnerable. The attack surface is broad, as the X-Original-Url header is commonly used by proxies and load balancers. With a simple HTTP request, an attacker can trigger the disclosure without prior knowledge of the admin location. [1][3]
Impact
Knowing the admin URL significantly lowers the barrier for further attacks. Attackers can attempt to brute-force credentials or exploit other vulnerabilities specifically targeting the admin panel. This could lead to full administrative control over the Magento-lts installation, resulting in data breaches, defacement, or supply chain attacks. [1][3]
Mitigation
The vulnerability is patched in Magento-lts versions 20.16.1 and 20.17.0. The fix unsets the X-Original-Url header in the bootstrap process. As a workaround, administrators can configure their web server to strip or ignore the X-Original-Url header. Users are strongly advised to upgrade to the latest patched version immediately. [3]
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
openmage/magento-ltsPackagist | < 20.16.1 | 20.16.1 |
Affected products
1- OpenMage/magento-ltsv5Range: < 20.16.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-jg68-vhv3-9r8fghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-25523ghsaADVISORY
- github.com/OpenMage/magento-lts/security/advisories/GHSA-jg68-vhv3-9r8fghsax_refsource_CONFIRMWEB
- hackerone.com/bugsghsax_refsource_MISCWEB
News mentions
0No linked articles in our index yet.