Shopware Platform vulnerabilities
42 known vulnerabilities affecting shopware/platform.
Total CVEs
42
CISA KEV
0
Public exploits
1
Exploited in wild
0
Severity breakdown
CRITICAL3HIGH20MEDIUM17LOW2
Vulnerabilities
Page 1 of 3
CVE-2026-31889HIGHCVSS 8.9v>= 6.7.0.0, < 6.7.8.1fixed in 6.6.10.152026-03-11
CVE-2026-31889 [HIGH] CWE-290 CVE-2026-31889: Shopware is an open commerce platform. Prior to 6.6.10.15 and 6.7.8.1, a vulnerability in the Shopwa
Shopware is an open commerce platform. Prior to 6.6.10.15 and 6.7.8.1, a vulnerability in the Shopware app registration flow that could, under specific conditions, allow attackers to take over the communication channel between a shop and an app. The legacy app registration flow used HMAC‑based authentication without sufficiently binding a shop install
ghsanvdosv
CVE-2026-31887HIGHCVSS 8.9v>= 6.7.0.0, < 6.7.8.1fixed in 6.6.10.152026-03-11
CVE-2026-31887 [HIGH] CWE-863 CVE-2026-31887: Shopware is an open commerce platform. Prior to 6.7.8.1 and 6.6.10.15, an insufficient check on the
Shopware is an open commerce platform. Prior to 6.7.8.1 and 6.6.10.15, an insufficient check on the filter types for unauthenticated customers allows access to orders of other customers. This is part of the deepLinkCode support on the store-api.order endpoint. This vulnerability is fixed in 6.7.8.1 and 6.6.10.15.
ghsanvdosv
CVE-2026-31888MEDIUMCVSS 5.3v>= 6.7.0.0, < 6.7.8.1fixed in 6.6.10.142026-03-11
CVE-2026-31888 [MEDIUM] CWE-204 CVE-2026-31888: Shopware is an open commerce platform. Prior to 6.7.8.1 and 6.6.10.15, the Store API login endpoint
Shopware is an open commerce platform. Prior to 6.7.8.1 and 6.6.10.15, the Store API login endpoint (POST /store-api/account/login) returns different error codes depending on whether the submitted email address belongs to a registered customer (CHECKOUT__CUSTOMER_AUTH_BAD_CREDENTIALS) or is unknown (CHECKOUT__CUSTOMER_NOT_FOUND). The "not found" resp
ghsanvdosv
CVE-2025-7954MEDIUM≥ 0, ≤ 6.6.10.42025-08-06
CVE-2025-7954 [MEDIUM] CWE-362 Shopware race condition bypasses voucher restrictions
Shopware race condition bypasses voucher restrictions
A race condition vulnerability has been identified in Shopware's voucher system of Shopware v6.6.10.4 that allows attackers to bypass intended voucher restrictions and exceed usage limitations.
ghsaosv
CVE-2025-32378LOW≥ 6.6.0.0-rc1, < 6.6.10.3≥ 6.7.0.0-rc1, < 6.7.0.0-rc2+1 more2025-04-09
CVE-2025-32378 [LOW] CWE-1188 Shopware default newsletter opt-in settings allow for mass sign-up abuse
Shopware default newsletter opt-in settings allow for mass sign-up abuse
### Impact
Currently the default settings for double-opt-in allow for mass unsolicited newsletter sign-ups without confirmation.
Default settings are:
Newsletter: Double Opt-in - active
Newsletter: Double opt-in for registered customers - disabled
Log-in & sign-up: Double opt-in on sign-up - disabled
With these sett
ghsaosv
CVE-2025-27892HIGHPoC≥ 6.7.0.0-rc1, < 6.7.0.0-rc2≥ 6.6.0.0, < 6.6.10.3+1 more2025-04-08
CVE-2025-27892 [HIGH] CWE-89 Shopware Vulnerable to Blind SQL-injection in DAL aggregations
Shopware Vulnerable to Blind SQL-injection in DAL aggregations
### Impact
The Shopware application API contains a search functionality which enables users to search through information stored within their Shopware instance. The searches performed by this function can be aggregated using the parameters in the “aggregations”
object. The ‘name’ field in this “aggregations” **in nested** object is vulnerabl
ghsaosv
CVE-2025-30151HIGH≥ 6.6.0.0, < 6.6.10.3≥ 6.7.0.0-rc1, < 6.7.0.0-rc2+1 more2025-04-08
CVE-2025-30151 [HIGH] CWE-20 Shopware allows Denial Of Service via password length
Shopware allows Denial Of Service via password length
### Impact
It's possible to pass long passwords that leads to Denial Of Service via forms in Storefront forms or Store-API.
### Patches
Update to Shopware 6.6.10.3 or 6.5.8.17
### Workarounds
For older versions of 6.4, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopwa
ghsaosv
CVE-2025-30150MEDIUM≥ 6.6.0.0, < 6.6.10.3≥ 6.7.0.0-rc1, < 6.7.0.0-rc2+1 more2025-04-08
CVE-2025-30150 [MEDIUM] CWE-204 Shopware 6 allows attackers to check for registered accounts through the store-api
Shopware 6 allows attackers to check for registered accounts through the store-api
### Impact
Through the store-api it is possible as a attacker to check if a specific e-mail address has an account in the shop.
Using the store-api endpoint `/store-api/account/recovery-password` you get the response
```
{"errors":[{"status":"404","code":"CHECKOUT__CUSTOMER_NOT_FOUND","title":"Not F
ghsaosv
CVE-2024-42356HIGH≥ 0, < 6.5.8.13≥ 6.6.0.0, < 6.6.5.12024-08-08
CVE-2024-42356 [HIGH] CWE-1336 Shopware vulnerable to Server Side Template Injection in Twig using Context functions
Shopware vulnerable to Server Side Template Injection in Twig using Context functions
### Impact
The `context` variable is injected into almost any Twig Template and allows to access to current language, currency information. The context object allows also to switch for a short time the scope of the Context as a helper with a callable function.
Example call from PHP:
```php
$co
ghsaosv
CVE-2024-42355HIGH≥ 0, < 6.5.8.13≥ 6.6.0.0, < 6.6.5.12024-08-08
CVE-2024-42355 [HIGH] CWE-1336 Shopware vulnerable to Server Side Template Injection in Twig using deprecation silence tag
Shopware vulnerable to Server Side Template Injection in Twig using deprecation silence tag
### Impact
Shopware has a new Twig Tag `sw_silent_feature_call` which silences deprecation messages while triggered in this tag.
It accepts as parameter a string the feature flag name to silence, but this parameter is not escaped properly and allows execution of code.
### Patches
U
ghsaosv
CVE-2024-42354MEDIUM≥ 0, < 6.5.8.13≥ 6.6.0.0, < 6.6.5.12024-08-08
CVE-2024-42354 [MEDIUM] CWE-284 Shopware vulnerable to Improper Access Control with ManyToMany associations in store-api
Shopware vulnerable to Improper Access Control with ManyToMany associations in store-api
### Impact
The store-API works with regular entities and not expose all fields for the public API; fields need to be marked as ApiAware in the EntityDefinition. So only ApiAware fields of the EntityDefinition will be encoded to the final JSON.
The processing of the Criteria did not cons
ghsaosv
CVE-2024-42357MEDIUM≥ 0, < 6.5.8.13≥ 6.6.0.0, < 6.6.5.12024-08-08
CVE-2024-42357 [MEDIUM] CWE-89 Shopware vulnerable to blind SQL-injection in DAL aggregations
Shopware vulnerable to blind SQL-injection in DAL aggregations
### Impact
The Shopware application API contains a search functionality which enables users to search through information stored within their Shopware instance. The searches performed by this function can be aggregated using the parameters in the “aggregations”
object. The ‘name’ field in this “aggregations” object is vulnerable SQL-inject
ghsaosv
CVE-2024-31447MEDIUM≥ 6.3.5.0, < 6.5.8.8≥ 6.6.0.0-rc1, < 6.6.1.02024-04-08
CVE-2024-31447 [MEDIUM] CWE-613 Shopware Improper Session Handling in store-api account logout
Shopware Improper Session Handling in store-api account logout
### Impact
When a authentificated request is made to `POST /store-api/account/logout`, the cart will be cleared, but the User won't be logged out. This affects only the direct store-api usage, as the PHP Storefront listens additionally on `CustomerLogoutEvent` and invalidates the session additionally.
### Patches
The problem has been fix
ghsaosv
CVE-2024-27917HIGH≥ 6.5.8.0, < 6.5.8.72024-03-06
CVE-2024-27917 [HIGH] CWE-524 Shopware's session is persistent in Cache for 404 pages
Shopware's session is persistent in Cache for 404 pages
### Impact
The Symfony Session Handler, pop's the Session Cookie and assign it to the Response. Since Shopware 6.5.8.0 the 404 pages, are cached, to improve the performance of 404 pages. So the cached Response, contains a Session Cookie when the Browser accessing the 404 page, has no cookies yet. The Symfony Session Handler is in use, when no explicit Se
ghsaosv
CVE-2024-22406CRITICAL≥ 0, < 6.5.7.42024-01-17
CVE-2024-22406 [CRITICAL] CWE-89 Blind SQL injection in shopware
Blind SQL injection in shopware
### Impact
The Shopware application API contains a search functionality which enables users to search through information stored within their Shopware instance. The searches performed by this function can be aggregated using the parameters in the “aggregations”
object. The ‘name’ field in this “aggregations” object is vulnerable SQL-injection and can be exploited using time-based SQL-queries.
### P
ghsaosv
CVE-2024-22407MEDIUM≥ 0, < 6.5.7.42024-01-17
CVE-2024-22407 [MEDIUM] CWE-284 Broken Access Control order API in Shopware
Broken Access Control order API in Shopware
### Impact
In the Shopware CMS, the state handler for orders fails to sufficiently verify user authorizations for actions that modify the payment, delivery, and/or order status. Due to this inadequate implementation, users lacking 'write' permissions for orders are still able to change the order state.
### Patches
Update to Shopware 6.5.7.4
### Workarounds
For older version
ghsaosv
CVE-2023-2017HIGHCVSS 8.8≥ 0, < 6.4.20.12023-04-18
CVE-2023-2017 [HIGH] CWE-1336 Shopware Has Improper Control of Generation of Code in Twig rendered views
Shopware Has Improper Control of Generation of Code in Twig rendered views
### Impact
We fixed with [CVE-2023-22731](https://github.com/shopware/platform/security/advisories/GHSA-93cw-f5jj-x85w) Twig filters to only be executed with allowed functions. It is possible to pass PHP Closures as string or an array and array crafted PHP Closures was not checked against allow list
### Patches
The p
ghsaosv
CVE-2023-22732CRITICALCVSS 9.8fixed in 6.4.18.12023-01-17
CVE-2023-22732 [CRITICAL] CWE-613 CVE-2023-22732: Shopware is an open source commerce platform based on Symfony Framework and Vue js. The Administrati
Shopware is an open source commerce platform based on Symfony Framework and Vue js. The Administration session expiration was set to one week, when an attacker has stolen the session cookie they could use it for a long period of time. In version 6.4.18.1 an automatic logout into the Administration session has been added. As a result the user will
ghsanvdosv
CVE-2023-22731HIGHCVSS 8.8fixed in 6.4.18.12023-01-17
CVE-2023-22731 [HIGH] CWE-94 CVE-2023-22731: Shopware is an open source commerce platform based on Symfony Framework and Vue js. In a Twig enviro
Shopware is an open source commerce platform based on Symfony Framework and Vue js. In a Twig environment **without the Sandbox extension**, it is possible to refer to PHP functions in twig filters like `map`, `filter`, `sort`. This allows a template to call any global PHP function and thus execute arbitrary code. The attacker must have access to a Twi
ghsanvdosv
CVE-2023-22730HIGHCVSS 7.5fixed in 6.4.18.12023-01-17
CVE-2023-22730 [HIGH] CWE-20 CVE-2023-22730: Shopware is an open source commerce platform based on Symfony Framework and Vue js. In affected vers
Shopware is an open source commerce platform based on Symfony Framework and Vue js. In affected versions It was possible to put the same line item multiple times in the cart using the AP. The Cart Validators checked the line item's individuality and the user was able to bypass quantity limits in sales. This problem has been fixed with version 6.4.18.1.
ghsanvdosv
1 / 3Next →