Shopware Core vulnerabilities
33 known vulnerabilities affecting shopware/core.
Total CVEs
33
CISA KEV
0
Public exploits
1
Exploited in wild
0
Severity breakdown
CRITICAL2HIGH14MEDIUM13LOW4
Vulnerabilities
Page 2 of 2
CVE-2023-22730MEDIUM≥ 0, < 6.4.18.12023-01-17
CVE-2023-22730 [MEDIUM] CWE-20 Shopware vulnerable to Improper Input Validation of Clearance sale in cart
Shopware vulnerable to Improper Input Validation of Clearance sale in cart
### Impact
It is possible to put the same line item multiple one in the cart using API, the Cart Validators checked the line item's individuality and the user was able to skip the clearance sale in cart
### Patches
The problem has been fixed with 6.4.18.1
### Workarounds
For older versions of 6.1, 6.2, and 6.3, cor
ghsaosv
CVE-2020-13997HIGH≥ 6.0.0, < 6.2.32022-05-24
CVE-2020-13997 [HIGH] CWE-209 Shopware database password is leaked to an unauthenticated users
Shopware database password is leaked to an unauthenticated users
In Shopware 6 before 6.2.3, the database password is leaked to an unauthenticated user when a DriverException occurs and verbose error handling is enabled. This vulnerability does not affect the shopware 5 release branch (`shopware/shopware` on packagist).
ghsaosv
CVE-2022-24871HIGH≥ 0, < 6.4.10.12022-04-22
CVE-2022-24871 [HIGH] CWE-918 Server-Side Request Forgery (SSRF) in Shopware
Server-Side Request Forgery (SSRF) in Shopware
### Impact
The attacker can abuse the Admin SDK functionality on the server to read or update internal resources.
### Patches
We recommend updating to the current version 6.4.10.1. You can get the update to 6.4.10.1 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/download/#shopware-6
### Workarounds
For older versions
ghsaosv
CVE-2022-24872HIGH≥ 0, < 6.4.10.12022-04-22
CVE-2022-24872 [HIGH] CWE-732 Improper Access Control in Shopware
Improper Access Control in Shopware
Shopware 6 is an open commerce platform based on Symfony Framework and Vue and supported by a worldwide community and more than 1.500 community extensions. Permissions set to sales channel context by admin-api are still useable within normal user session. We recommend updating to the current version 6.4.10.1. You can get the update to 6.4.10.1 regularly via the Auto-Updater or directly via the
ghsaosv
CVE-2022-24746MEDIUM≥ 0, < 6.4.8.12022-03-10
CVE-2022-24746 [MEDIUM] CWE-79 HTML injection possibility in voucher code form in Shopware
HTML injection possibility in voucher code form in Shopware
### Impact
HTML injection possibility in voucher code form
## Patches
Patched in 6.4.8.1, maintainers recommend updating to the current version 6.4.8.2. You can get the update to 6.4.8.2 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/download/#shopware-6
## Workarounds
For older versions of 6.
ghsaosv
CVE-2022-24747MEDIUM≥ 0, < 6.4.8.22022-03-10
CVE-2022-24747 [MEDIUM] CWE-200 HTTP caching is marking private HTTP headers as public in Shopware
HTTP caching is marking private HTTP headers as public in Shopware
### Impact
HTTP caching is marking private HTTP headers as public
## Patches
Fixed in recommend updating to the current version 6.4.8.2. You can get the update to 6.4.8.2 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/download/#shopware-6
## Workarounds
For older versions of 6.1
ghsaosv
CVE-2022-24748MEDIUM≥ 0, < 6.4.8.22022-03-10
CVE-2022-24748 [MEDIUM] CWE-287 Incorrect Authentication in shopware
Incorrect Authentication in shopware
### Impact
Modify Customers, create Orders without App Permission
## Patches
We recommend updating to the current version 6.4.8.2. You can get the update to 6.4.8.2 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/download/#shopware-6
## Workarounds
For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available
ghsaosv
CVE-2022-24744LOW≥ 0, < 6.4.8.12022-03-10
CVE-2022-24744 [LOW] CWE-613 Shopware user session is not logged out if the password is reset via password recovery
Shopware user session is not logged out if the password is reset via password recovery
### Impact
User session is not logged out if the password is reset via password recovery
## Patches
Fixed in 6.4.8.1, maintainers recommend updating to the current version 6.4.8.2. You can get the update to 6.4.8.2 regularly via the Auto-Updater or directly via the download overview.
https://w
ghsaosv
CVE-2021-37708HIGH≥ 0, < 6.4.3.12021-08-30
CVE-2021-37708 [HIGH] CWE-77 Command injection in mail agent settings
Command injection in mail agent settings
### Impact
Command injection in mail agent settings
### Patches
We recommend updating to the current version 6.4.3.1. You can get the update to 6.4.3.1 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/download/#shopware-6
### Workarounds
For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a
ghsaosv
CVE-2021-37709MEDIUM≥ 0, < 6.4.3.12021-08-30
CVE-2021-37709 [MEDIUM] CWE-532 Insecure direct object reference of log files of the Import/Export feature
Insecure direct object reference of log files of the Import/Export feature
### Impact
Insecure direct object reference of log files of the Import/Export feature
### Patches
We recommend updating to the current version 6.4.3.1. You can get the update to 6.4.3.1 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/download/#shopware-6
### Worka
ghsaosv
CVE-2021-37707MEDIUM≥ 0, < 6.4.3.12021-08-30
CVE-2021-37707 [MEDIUM] CWE-20 Manipulation of product reviews via API
Manipulation of product reviews via API
### Impact
Manipulation of product reviews via API
### Patches
We recommend updating to the current version 6.4.3.1. You can get the update to 6.4.3.1 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/download/#shopware-6
### Workarounds
For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a p
ghsaosv
CVE-2021-37710HIGH≥ 0, < 6.4.3.12021-08-23
CVE-2021-37710 [HIGH] CWE-79 Cross-Site Scripting via SVG media files
Cross-Site Scripting via SVG media files
### Impact
Cross-Site Scripting via SVG media files
### Patches
We recommend updating to the current version 6.4.3.1. You can get the update to 6.4.3.1 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/download/#shopware-6
### Workarounds
For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a
ghsaosv
CVE-2021-37711HIGH≥ 0, < 6.4.3.12021-08-23
CVE-2021-37711 [HIGH] CWE-918 Authenticated server-side request forgery in file upload via URL.
Authenticated server-side request forgery in file upload via URL.
### Impact
Authenticated server-side request forgery in file upload via URL.
### Patches
We recommend updating to the current version 6.4.3.1. You can get the update to 6.4.3.1 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/download/#shopware-6
### Workarounds
For older versions of
ghsaosv
← Previous2 / 2