Skip to content

Nginx remediation for vulnerability CVE-2025-54236#40744

Open
lfluvisotto wants to merge 1 commit intomagento:2.4-developfrom
lfluvisotto:nginx-conf-sample-CVE-2025-54236
Open

Nginx remediation for vulnerability CVE-2025-54236#40744
lfluvisotto wants to merge 1 commit intomagento:2.4-developfrom
lfluvisotto:nginx-conf-sample-CVE-2025-54236

Conversation

@lfluvisotto
Copy link
Copy Markdown
Contributor

@lfluvisotto lfluvisotto commented Apr 16, 2026

Description (*)

This pull request introduces an additional security mitigation related to CVE-2025-54236.

It was identified that the /media/customer_address/ directory may be publicly accessible, which could expose sensitive files and increase the risk of exploitation.

To reduce the attack surface, this change recommends restricting direct access to this directory at the web server level by adding the following configuration to nginx.conf

This mitigation provides a defense-in-depth layer and helps prevent unauthorized access to sensitive resources. It does not replace applying official security patches but complements them.

Related Pull Requests

N/A

Fixed Issues (if relevant)

https://sansec.io/research/sessionreaper

Manual testing scenarios (*)

Apply the Nginx configuration.
Reload or restart Nginx.
Attempt to access a file inside /media/customer_address/ via a browser or HTTP request.
Verify that access is denied.

Questions or comments

This change is intended as a security hardening measure.

Contribution checklist (*)

  • Pull request has a meaningful description of its purpose
  • All commits are accompanied by meaningful commit messages
  • All new or changed code is covered with unit/integration tests (if applicable)
  • README.md files for modified modules are updated and included in the pull request if any README.md predefined sections require an update
  • All automated tests passed successfully (all builds are green)

Resolved issues:

  1. resolves [Issue] Nginx remediation for vulnerability CVE-2025-54236 #40764: Nginx remediation for vulnerability CVE-2025-54236

@m2-assistant
Copy link
Copy Markdown

m2-assistant Bot commented Apr 16, 2026

Hi @lfluvisotto. Thank you for your contribution!
Here are some useful tips on how you can test your changes using Magento test environment.
❗ Automated tests can be triggered manually with an appropriate comment:

  • @magento run all tests - run or re-run all required tests against the PR changes
  • @magento run <test-build(s)> - run or re-run specific test build(s)
    For example: @magento run Unit Tests

<test-build(s)> is a comma-separated list of build names.

Allowed build names are:
  1. Database Compare
  2. Functional Tests CE
  3. Functional Tests EE
  4. Functional Tests B2B
  5. Integration Tests
  6. Magento Health Index
  7. Sample Data Tests CE
  8. Sample Data Tests EE
  9. Sample Data Tests B2B
  10. Static Tests
  11. Unit Tests
  12. WebAPI Tests
  13. Semantic Version Checker

You can find more information about the builds here
ℹ️ Run only required test builds during development. Run all test builds before sending your pull request for review.


For more details, review the Code Contributions documentation.
Join Magento Community Engineering Slack and ask your questions in #github channel.

@ct-prd-pr-scan
Copy link
Copy Markdown

The security team has been informed about this pull request due to the presence of risky security keywords. For security vulnerability reports, please visit Adobe's vulnerability disclosure program on HackerOne or email psirt@adobe.com.

5 similar comments
@ct-prd-pr-scan
Copy link
Copy Markdown

The security team has been informed about this pull request due to the presence of risky security keywords. For security vulnerability reports, please visit Adobe's vulnerability disclosure program on HackerOne or email psirt@adobe.com.

@ct-prd-pr-scan
Copy link
Copy Markdown

The security team has been informed about this pull request due to the presence of risky security keywords. For security vulnerability reports, please visit Adobe's vulnerability disclosure program on HackerOne or email psirt@adobe.com.

@ct-prd-pr-scan
Copy link
Copy Markdown

The security team has been informed about this pull request due to the presence of risky security keywords. For security vulnerability reports, please visit Adobe's vulnerability disclosure program on HackerOne or email psirt@adobe.com.

@ct-prd-pr-scan
Copy link
Copy Markdown

The security team has been informed about this pull request due to the presence of risky security keywords. For security vulnerability reports, please visit Adobe's vulnerability disclosure program on HackerOne or email psirt@adobe.com.

@ct-prd-pr-scan
Copy link
Copy Markdown

The security team has been informed about this pull request due to the presence of risky security keywords. For security vulnerability reports, please visit Adobe's vulnerability disclosure program on HackerOne or email psirt@adobe.com.

@lfluvisotto
Copy link
Copy Markdown
Contributor Author

@magento run all tests

@engcom-Dash
Copy link
Copy Markdown
Contributor

@magento create issue

@ct-prd-pr-scan
Copy link
Copy Markdown

The security team has been informed about this pull request due to the presence of risky security keywords. For security vulnerability reports, please visit Adobe's vulnerability disclosure program on HackerOne or email psirt@adobe.com.

@engcom-Dash engcom-Dash added the Priority: P2 A defect with this priority could have functionality issues which are not to expectations. label Apr 21, 2026
@github-project-automation github-project-automation Bot moved this to Pending Review in Pull Requests Dashboard Apr 21, 2026
@lfluvisotto
Copy link
Copy Markdown
Contributor Author

@engcom-Charlie follow-up

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Priority: P2 A defect with this priority could have functionality issues which are not to expectations. Progress: pending review

Projects

Status: Pending Review

Development

Successfully merging this pull request may close these issues.

[Issue] Nginx remediation for vulnerability CVE-2025-54236

2 participants