Severity
8.8HIGHNVD
NVD7.2
EPSS
2.0%
top 16.39%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 17
Latest updateJan 14

Description

Server-side Template Injection (SSTI) in Shopware 6 (<= v6.4.20.0, v6.5.0.0-rc1 <= v6.5.0.0-rc4), affecting both shopware/core and shopware/platform GitHub repositories, allows remote attackers with access to a Twig environment without the Sandbox extension to bypass the validation checks in `Shopware\Core\Framework\Adapter\Twig\SecurityExtension` and call any arbitrary PHP function and thus execute arbitrary code/commands via usage of fully-qualified names, supplied as array of strings, when re

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages5 packages

Packagistshopware/core6.7.0.06.7.6.1+1
Packagistshopware/platform< 6.4.20.1
NVDshopware/shopware6.7.0.06.7.6.1+2
Packagistshopware/shopware6.7.0.06.7.6.1
CVEListV5shopware/shopware>= 6.7.0.0, < 6.7.6.1

🔴Vulnerability Details

4
GHSA
Shopware Has Improper Control of Generation of Code in Twig rendered views2026-01-14
OSV
Shopware Has Improper Control of Generation of Code in Twig rendered views2026-01-14
GHSA
Shopware Has Improper Control of Generation of Code in Twig rendered views2023-04-18
OSV
Shopware Has Improper Control of Generation of Code in Twig rendered views2023-04-18

🕵️Threat Intelligence

2
Trendmicro
8220 Gang Evolves With New Strategies2023-05-16
Wiz
CVE-2026-23498 Impact, Exploitability, and Mitigation Steps | Wiz