Page 3 of 41 results (0.006 seconds)

CVSS: 9.9EPSS: 0%CPEs: 1EXPL: 0

Shopware is an open source commerce platform based on Symfony Framework and Vue js. In a Twig environment **without the Sandbox extension**, it is possible to refer to PHP functions in twig filters like `map`, `filter`, `sort`. This allows a template to call any global PHP function and thus execute arbitrary code. The attacker must have access to a Twig environment in order to exploit this vulnerability. This problem has been fixed with 6.4.18.1 with an override of the specified filters until the integration of the Sandbox extension has been finished. • https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-01-2023?category=security-updates https://github.com/shopware/platform/commit/89d1ea154689cb6202e0d3a0ceeae0febb0c09e1 https://github.com/shopware/platform/security/advisories/GHSA-93cw-f5jj-x85w • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Shopware is an open source commerce platform based on Symfony Framework and Vue js. In affected versions It was possible to put the same line item multiple times in the cart using the AP. The Cart Validators checked the line item's individuality and the user was able to bypass quantity limits in sales. This problem has been fixed with version 6.4.18.1. Users on major versions 6.1, 6.2, and 6.3 may also obtain this fix via a plugin. • https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-01-2023?category=security-updates https://github.com/shopware/platform/commit/4fce12096e54b2033832d9104fa2e68888c2b4e9 https://github.com/shopware/platform/security/advisories/GHSA-8r6h-m72v-38fg • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Shopware is an open source commerce platform based on Symfony Framework and Vue js. The newsletter double opt-in validation was not checked properly, and it was possible to skip the complete double opt in process. As a result operators may have inconsistencies in their newsletter systems. This problem has been fixed with version 6.4.18.1. Users are advised to upgrade. • https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-01-2023?category=security-updates https://github.com/shopware/platform/commit/f5a95ee2bcf1e546878450963ef1d9886e59a620 https://github.com/shopware/platform/security/advisories/GHSA-46h7-vj7x-fxg2 • CWE-20: Improper Input Validation •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

Shopware is an open source e-commerce software. In affected versions if backend admin controllers are called with a certain notation, the ACL could be bypassed. Users could execute actions, which they are normally not able to do. Users are advised to update to the current version (5.7.15). Users can get the update via the Auto-Updater or directly via the download overview. • https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-09-2022 https://github.com/shopware/shopware/commit/de92d3a78279119a5bbe203054f8fa1d25126af6 https://github.com/shopware/shopware/security/advisories/GHSA-qc43-pgwq-3q2q https://packagist.org/packages/shopware/shopware • CWE-281: Improper Preservation of Permissions •

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 0

Shopware is an open source e-commerce software. In affected versions the request for the customer detail view in the backend administration contained sensitive data like the hashed password and the session ID. These fields are now explicitly unset in version 5.7.15. Users are advised to update and may get the update either via the Auto-Updater or directly via the download overview. There are no known workarounds for this issue. • https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-09-2022 https://github.com/shopware/shopware/commit/af5cdbc81d60f21b728e1433aeb8837f25938d2a https://github.com/shopware/shopware/security/advisories/GHSA-6vfq-jmxg-g58r https://packagist.org/packages/shopware/shopware • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •