Description
Shopware is an open commerce platform. From 6.7.0.0 to before 6.7.6.1, a regression of CVE-2023-2017 leads to an array and array crafted PHP Closure not checked being against allow list for the map(...) override. This vulnerability is fixed in 6.7.6.1.
Published: 2026-01-14
Score: 7.2 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The vulnerability originates from a regression in Shopware versions 6.7.0.0 through 6.7.6.0, where array‑crafted PHP Closure objects that are passed to the map(...) override are not validated against an allow list. Because Twig’s rendering engine can execute code defined by such closures, an attacker can inject malicious PHP code, which is categorized as CWE‑94. The impact includes potential compromise of confidentiality, integrity, and availability of the application and its underlying server. Based on the description, it is inferred that an attacker can trigger execution without requiring explicit authentication or privileged access.

Affected Systems

Affected systems are deployments of the Shopware e‑commerce platform by the vendor shopware. The vulnerability is present in versions starting with 6.7.0.0 and continuing through 6.7.6.0; versions 6.7.6.1 and later contain the fix that validates closures against the allow list.

Risk and Exploitability

The CVSS v3.1 base score is 7.2, indicating a high severity risk. The EPSS score is cited as less than 1 %, indicating a low probability of exploitation today; the vulnerability is not listed in the CISA KEV catalog. The likely attack vector is through crafted input that travels through Twig’s map(...) functionality, where an attacker may manipulate template content or provide data that triggers the closure. It is inferred that success requires influencing the content rendered by the application, such as by uploading or editing a template or providing specially constructed data. Because the vector is not publicly documented, the actual exploitation risk is moderate, but a successful attack could lead to full remote code execution on the host.

Generated by OpenCVE AI on April 18, 2026 at 19:12 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Shopware to version 6.7.6.1 or newer.
  • Validate or remove dynamic closures passed to the map(...) function to ensure they meet the allow list.
  • Monitor application logs for unexpected PHP code execution or errors that may indicate an attempt to exploit the rendering engine.

Generated by OpenCVE AI on April 18, 2026 at 19:12 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-7cw6-7h3h-v8pf Shopware Has Improper Control of Generation of Code in Twig rendered views
History

Wed, 28 Jan 2026 17:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:shopware:shopware:*:*:*:*:*:*:*:*

Thu, 15 Jan 2026 08:15:00 +0000

Type Values Removed Values Added
First Time appeared Shopware
Shopware shopware
Vendors & Products Shopware
Shopware shopware

Wed, 14 Jan 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 14 Jan 2026 18:45:00 +0000

Type Values Removed Values Added
Description Shopware is an open commerce platform. From 6.7.0.0 to before 6.7.6.1, a regression of CVE-2023-2017 leads to an array and array crafted PHP Closure not checked being against allow list for the map(...) override. This vulnerability is fixed in 6.7.6.1.
Title Shopware Improper Control of Generation of Code in Twig rendered views
Weaknesses CWE-94
References
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Shopware Shopware
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-01-14T21:15:57.391Z

Reserved: 2026-01-13T15:47:41.629Z

Link: CVE-2026-23498

cve-icon Vulnrichment

Updated: 2026-01-14T21:15:53.759Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-14T19:16:48.430

Modified: 2026-01-28T17:17:16.237

Link: CVE-2026-23498

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T19:15:10Z

Weaknesses