Impact
FroshAdminer, a Shopware Platform plugin, allowed unauthenticated users to reach its Adminer interface at /admin/adminer. The plugin was configured with auth_required set to false and performed no session validation, thus exposing the database management UI. An attacker who gains access to the UI could view database credentials, execute arbitrary queries against the shop's database, and potentially modify or delete data, resulting in a breach of confidentiality and integrity.
Affected Systems
FriendsOfShopware’s FroshPlatformAdminer plugin is affected in all versions prior to 2.2.1. Users running any older version of the plugin are at risk until they upgrade to 2.2.1 or later, where the authentication requirement has been enforced.
Risk and Exploitability
The vulnerability carries a CVSS score of 6.9, indicating medium severity, and an EPSS score of less than 1 %, meaning exploit probability is low. It is not listed in CISA’s KEV catalog. Attackers would most likely exploit the weakness by simply browsing to /admin/adminer via a web browser, as the route is publicly reachable without authentication. The weakness falls under CWE‑306, reflecting missing authentication protection.
OpenCVE Enrichment
Github GHSA