Shopware Core vulnerabilities

33 known vulnerabilities affecting shopware/core.

Total CVEs
33
CISA KEV
0
Public exploits
1
Exploited in wild
0
Severity breakdown
CRITICAL2HIGH14MEDIUM13LOW4

Vulnerabilities

Page 1 of 2
CVE-2026-31889HIGHCVSS 8.9v>= 6.7.0.0, < 6.7.8.1fixed in 6.6.10.152026-03-11
CVE-2026-31889 [HIGH] CWE-290 CVE-2026-31889: Shopware is an open commerce platform. Prior to 6.6.10.15 and 6.7.8.1, a vulnerability in the Shopwa Shopware is an open commerce platform. Prior to 6.6.10.15 and 6.7.8.1, a vulnerability in the Shopware app registration flow that could, under specific conditions, allow attackers to take over the communication channel between a shop and an app. The legacy app registration flow used HMAC‑based authentication without sufficiently binding a shop install
ghsanvdosv
CVE-2026-31887HIGHCVSS 8.9v>= 6.7.0.0, < 6.7.8.1fixed in 6.6.10.152026-03-11
CVE-2026-31887 [HIGH] CWE-863 CVE-2026-31887: Shopware is an open commerce platform. Prior to 6.7.8.1 and 6.6.10.15, an insufficient check on the Shopware is an open commerce platform. Prior to 6.7.8.1 and 6.6.10.15, an insufficient check on the filter types for unauthenticated customers allows access to orders of other customers. This is part of the deepLinkCode support on the store-api.order endpoint. This vulnerability is fixed in 6.7.8.1 and 6.6.10.15.
ghsanvdosv
CVE-2026-31888MEDIUMCVSS 5.3v>= 6.7.0.0, < 6.7.8.1fixed in 6.6.10.152026-03-11
CVE-2026-31888 [MEDIUM] CWE-204 CVE-2026-31888: Shopware is an open commerce platform. Prior to 6.7.8.1 and 6.6.10.15, the Store API login endpoint Shopware is an open commerce platform. Prior to 6.7.8.1 and 6.6.10.15, the Store API login endpoint (POST /store-api/account/login) returns different error codes depending on whether the submitted email address belongs to a registered customer (CHECKOUT__CUSTOMER_AUTH_BAD_CREDENTIALS) or is unknown (CHECKOUT__CUSTOMER_NOT_FOUND). The "not found" resp
ghsanvdosv
CVE-2026-23498HIGHCVSS 8.8≥ 6.7.0.0, < 6.7.6.12026-01-14
CVE-2026-23498 [HIGH] CWE-94 Shopware Has Improper Control of Generation of Code in Twig rendered views Shopware Has Improper Control of Generation of Code in Twig rendered views ### Impact We fixed with [CVE-2023-2017](https://github.com/advisories/GHSA-7v2v-9rm4-7m8f) Twig filters to only be executed with allowed functions. However there was a regression that lead to an array and array crafted PHP Closure not checked being against allow list for the map(...) override ### Patches Patched in 6
ghsaosv
CVE-2025-32378LOW≥ 6.6.0.0-rc1, < 6.6.10.3≥ 6.7.0.0-rc1, < 6.7.0.0-rc2+1 more2025-04-09
CVE-2025-32378 [LOW] CWE-1188 Shopware default newsletter opt-in settings allow for mass sign-up abuse Shopware default newsletter opt-in settings allow for mass sign-up abuse ### Impact Currently the default settings for double-opt-in allow for mass unsolicited newsletter sign-ups without confirmation. Default settings are: Newsletter: Double Opt-in - active Newsletter: Double opt-in for registered customers - disabled Log-in & sign-up: Double opt-in on sign-up - disabled With these sett
ghsaosv
CVE-2025-27892HIGHPoC≥ 6.7.0.0-rc1, < 6.7.0.0-rc2≥ 6.6.0.0, < 6.6.10.3+1 more2025-04-08
CVE-2025-27892 [HIGH] CWE-89 Shopware Vulnerable to Blind SQL-injection in DAL aggregations Shopware Vulnerable to Blind SQL-injection in DAL aggregations ### Impact The Shopware application API contains a search functionality which enables users to search through information stored within their Shopware instance. The searches performed by this function can be aggregated using the parameters in the “aggregations” object. The ‘name’ field in this “aggregations” **in nested** object is vulnerabl
ghsaosv
CVE-2025-30151HIGH≥ 6.6.0.0, < 6.6.10.3≥ 6.7.0.0-rc1, < 6.7.0.0-rc2+1 more2025-04-08
CVE-2025-30151 [HIGH] CWE-20 Shopware allows Denial Of Service via password length Shopware allows Denial Of Service via password length ### Impact It's possible to pass long passwords that leads to Denial Of Service via forms in Storefront forms or Store-API. ### Patches Update to Shopware 6.6.10.3 or 6.5.8.17 ### Workarounds For older versions of 6.4, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopwa
ghsaosv
CVE-2025-30150MEDIUM≥ 6.6.0.0, < 6.6.10.3≥ 6.7.0.0-rc1, < 6.7.0.0-rc2+1 more2025-04-08
CVE-2025-30150 [MEDIUM] CWE-204 Shopware 6 allows attackers to check for registered accounts through the store-api Shopware 6 allows attackers to check for registered accounts through the store-api ### Impact Through the store-api it is possible as a attacker to check if a specific e-mail address has an account in the shop. Using the store-api endpoint `/store-api/account/recovery-password` you get the response ``` {"errors":[{"status":"404","code":"CHECKOUT__CUSTOMER_NOT_FOUND","title":"Not F
ghsaosv
CVE-2024-42356HIGH≥ 0, < 6.5.8.13≥ 6.6.0.0, < 6.6.5.12024-08-08
CVE-2024-42356 [HIGH] CWE-1336 Shopware vulnerable to Server Side Template Injection in Twig using Context functions Shopware vulnerable to Server Side Template Injection in Twig using Context functions ### Impact The `context` variable is injected into almost any Twig Template and allows to access to current language, currency information. The context object allows also to switch for a short time the scope of the Context as a helper with a callable function. Example call from PHP: ```php $co
ghsaosv
CVE-2024-42355HIGH≥ 0, < 6.5.8.13≥ 6.6.0.0, < 6.6.5.12024-08-08
CVE-2024-42355 [HIGH] CWE-1336 Shopware vulnerable to Server Side Template Injection in Twig using deprecation silence tag Shopware vulnerable to Server Side Template Injection in Twig using deprecation silence tag ### Impact Shopware has a new Twig Tag `sw_silent_feature_call` which silences deprecation messages while triggered in this tag. It accepts as parameter a string the feature flag name to silence, but this parameter is not escaped properly and allows execution of code. ### Patches U
ghsaosv
CVE-2024-42354MEDIUM≥ 0, < 6.5.8.13≥ 6.6.0.0, < 6.6.5.12024-08-08
CVE-2024-42354 [MEDIUM] CWE-284 Shopware vulnerable to Improper Access Control with ManyToMany associations in store-api Shopware vulnerable to Improper Access Control with ManyToMany associations in store-api ### Impact The store-API works with regular entities and not expose all fields for the public API; fields need to be marked as ApiAware in the EntityDefinition. So only ApiAware fields of the EntityDefinition will be encoded to the final JSON. The processing of the Criteria did not cons
ghsaosv
CVE-2024-42357MEDIUM≥ 0, < 6.5.8.13≥ 6.6.0.0, < 6.6.5.12024-08-08
CVE-2024-42357 [MEDIUM] CWE-89 Shopware vulnerable to blind SQL-injection in DAL aggregations Shopware vulnerable to blind SQL-injection in DAL aggregations ### Impact The Shopware application API contains a search functionality which enables users to search through information stored within their Shopware instance. The searches performed by this function can be aggregated using the parameters in the “aggregations” object. The ‘name’ field in this “aggregations” object is vulnerable SQL-inject
ghsaosv
CVE-2024-31447MEDIUM≥ 6.3.5.0, < 6.5.8.8≥ 6.6.0.0-rc1, < 6.6.1.02024-04-08
CVE-2024-31447 [MEDIUM] CWE-613 Shopware Improper Session Handling in store-api account logout Shopware Improper Session Handling in store-api account logout ### Impact When a authentificated request is made to `POST /store-api/account/logout`, the cart will be cleared, but the User won't be logged out. This affects only the direct store-api usage, as the PHP Storefront listens additionally on `CustomerLogoutEvent` and invalidates the session additionally. ### Patches The problem has been fix
ghsaosv
CVE-2024-22406CRITICAL≥ 0, < 6.5.7.42024-01-17
CVE-2024-22406 [CRITICAL] CWE-89 Blind SQL injection in shopware Blind SQL injection in shopware ### Impact The Shopware application API contains a search functionality which enables users to search through information stored within their Shopware instance. The searches performed by this function can be aggregated using the parameters in the “aggregations” object. The ‘name’ field in this “aggregations” object is vulnerable SQL-injection and can be exploited using time-based SQL-queries. ### P
ghsaosv
CVE-2024-22407MEDIUM≥ 0, < 6.5.7.42024-01-17
CVE-2024-22407 [MEDIUM] CWE-284 Broken Access Control order API in Shopware Broken Access Control order API in Shopware ### Impact In the Shopware CMS, the state handler for orders fails to sufficiently verify user authorizations for actions that modify the payment, delivery, and/or order status. Due to this inadequate implementation, users lacking 'write' permissions for orders are still able to change the order state. ### Patches Update to Shopware 6.5.7.4 ### Workarounds For older version
ghsaosv
CVE-2023-2017HIGHCVSS 8.8≥ 0, < 6.4.20.12023-04-18
CVE-2023-2017 [HIGH] CWE-1336 Shopware Has Improper Control of Generation of Code in Twig rendered views Shopware Has Improper Control of Generation of Code in Twig rendered views ### Impact We fixed with [CVE-2023-22731](https://github.com/shopware/platform/security/advisories/GHSA-93cw-f5jj-x85w) Twig filters to only be executed with allowed functions. It is possible to pass PHP Closures as string or an array and array crafted PHP Closures was not checked against allow list ### Patches The p
ghsaosv
CVE-2023-22734MEDIUM≥ 0, < 6.4.18.12023-01-20
CVE-2023-22734 [MEDIUM] CWE-20 Shopware has Improper Input Validation issue in newsletter subscription Shopware has Improper Input Validation issue in newsletter subscription ### Impact The newsletter double opt-in validation was not checked properly, and it was possible to skip the complete double opt in process. ### Patches The problem has been fixed with 6.4.18.1 ### Workarounds For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For t
ghsaosv
CVE-2023-22733LOW≥ 0, < 6.4.18.12023-01-20
CVE-2023-22733 [LOW] CWE-117 Shopware's log module vulnerable to Improper Output Neutralization Shopware's log module vulnerable to Improper Output Neutralization ### Impact The log module contains all kind of sent mails. It is possible to see the password reset email of customers and admin users to gain probably more access. ### Patches Update to the latest 6.4.18.1 version. ### Workarounds - For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a p
ghsaosv
CVE-2023-22732LOW≥ 0, < 6.4.18.12023-01-20
CVE-2023-22732 [LOW] CWE-613 Shopware has Insufficient Session Expiration in Administration Shopware has Insufficient Session Expiration in Administration ### Impact The Administration session expiration was set to one week, when an attacker has stolen the session cookie they could use it for a long period of time. ### Patches We added an automatic logout into the Administration, so the user will be logged out when they are inactive. ### References https://docs.shopware.com/en/shopware-6-en/
ghsaosv
CVE-2023-22731CRITICAL≥ 0, < 6.4.18.12023-01-17
CVE-2023-22731 [CRITICAL] CWE-94 Shopware vulnerable to Improper Control of Generation of Code in Twig rendered views Shopware vulnerable to Improper Control of Generation of Code in Twig rendered views ### Impact In Twig environment **without the Sandbox extension**, it is possible to refer to PHP functions in twig filters like `map`, `filter`, `sort`. This allows in the template to call any global PHP function. ### Patches The problem has been fixed with 6.4.18.1 with an override of the spec
ghsaosv