qoliber / magento-open-source-security
Magento 2 security modules for Qoliber open source patches and fixes.
Package info
github.com/qoliber/magento-open-source-security
Type:magento2-module
pkg:composer/qoliber/magento-open-source-security
Requires
- qoliber/core: *
This package is auto-updated.
Last update: 2026-04-03 13:44:13 UTC
README
Security hardening package for Magento Open Source and Adobe Commerce.
This package contains two Magento 2 modules:
Qoliber_PolyshellPatchQoliber_SessionReaperFix
Both modules are intended as defensive mitigations. They deliberately disable specific upload flows that can be abused.
What It Fixes
PolyShell
Qoliber_PolyshellPatch blocks file-type custom option uploads through the Web API product option flow.
This is intended as a mitigation for the vulnerability commonly referred to as PolyShell and associated with Adobe bulletin APSB25-94.
Security tradeoff:
- file-type custom option uploads through this API path are disabled
- integrations relying on that upload behavior will stop working until a vendor patch or a different safe implementation is used
SessionReaper
Qoliber_SessionReaperFix overrides the frontend customer address file upload controller and returns 404 Not Found.
This closes unauthorized uploads to the customer address media directory.
Important note:
- the original
SessionReaperissue is already addressed by released Adobe / Magento patches - however, those patches still allow unauthorized upload attempts to the
customer_addressmedia directory - this module hard-disables that upload endpoint as an additional security measure
Security tradeoff:
- customer address file uploads are disabled
- any storefront functionality depending on customer address file attachments will no longer work
Installation
Install the package with Composer in your Magento project:
composer require qoliber/magento-open-source-security
Then apply Magento setup changes:
bin/magento setup:upgrade bin/magento cache:flush
Warnings
- This package is intentionally restrictive.
- It is designed to reduce attack surface, not to preserve all original upload features.
- Review business flows and third-party integrations before enabling it in production.
- If you depend on file uploads in custom options or customer address flows, test those paths explicitly after installation.
Package Contents
src/polyshell-patch-moduleprovidesQoliber_PolyshellPatchsrc/session-reaper-fix-moduleprovidesQoliber_SessionReaperFix
License
MIT