P012C
PolyShell (CVE-2025-54236)
Description
A known vulnerability in Magento allows attackers to upload malicious files through the custom options file upload feature. These files are stored in the /media/custom_options/ directory and can potentially be executed directly via the web server, leading to remote code execution. This patch blocks public access to that path at the NGINX level. See CVE-2025-54236 for more details.
Impact
There is no downtime expected from this change. NGINX will be reloaded on all web nodes after the configuration is applied.
Changes
- Drops an NGINX configuration file (
00-polyshell-mitigation.conf) into each Magento site'sconf.ddirectory that denies all access to/media/custom_options/. - Copies the same configuration into the vhost template directory so that any new sites provisioned in the future will also include the mitigation.
- Tests the NGINX configuration and reloads NGINX on all web nodes.
If You Accept
All public access to /media/custom_options/ will be blocked at the NGINX level, protecting your store from this attack vector. New sites created after the patch will also include the mitigation automatically.
If You Reject
The /media/custom_options/ path will remain publicly accessible, leaving your store vulnerable to potential remote code execution via malicious file uploads.