Magento's X-Original-Url header can expose admin url
Moderate severity
GitHub Reviewed
Published
Feb 2, 2026
in
OpenMage/magento-lts
•
Updated Feb 5, 2026
Description
Published to the GitHub Advisory Database
Feb 2, 2026
Reviewed
Feb 2, 2026
Published by the National Vulnerability Database
Feb 4, 2026
Last updated
Feb 5, 2026
Impact
The admin url can be discovered without prior knowledge of its location by exploiting the X-Original-Url header on some configurations.
Patches
The bug comes from the Zend library.
Workarounds
Unset the X-Original-Url header in the web server configuration.
Resources
https://hackerone.com/bugs?subject=openmage&report_id=3416312
Upon deeper investigation, it was initially not found, but then it was realized that the search excluded the vendor/ directory. This is coming from the Zend_Controller module. Here is another tip from 2016 - it is surprising that this was not somehow patched already!
https://peterocallaghan.co.uk/2016/12/magento-poisoning-cache/ (dead link now..)
Credit
Anees Hyder (anees0x_dev) on HackerOne
https://hackerone.com/anees0x_dev/hacktivity?type=user
References