Description
Sylius is an Open Source eCommerce Framework on Symfony. Sylius API filters ProductPriceOrderFilter and TranslationOrderNameAndLocaleFilter pass user-supplied order direction values directly to Doctrine's orderBy() without validation. An attacker can inject arbitrary DQL. The issue is fixed in versions: 1.9.12, 1.10.16, 1.11.17, 1.12.23, 1.13.15, 1.14.18, 2.0.16, 2.1.12, 2.2.3 and above.
Published: 2026-03-10
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Database Query Injection
Action: Patch
AI Analysis

Impact

Sylius API filters ProductPriceOrderFilter and TranslationOrderNameAndLocaleFilter report user‑supplied order direction values directly to Doctrine’s orderBy() without any validation. This allows an attacker to inject arbitrary DQL which can be executed against the database. The consequence is that non‑privileged input can compel the application to run unintended database statements, potentially exposing private data, tampering with data, or disrupting service. The flaw is classified as CWE‑89 and CWE‑943. Based on the description, the attack vector is inferred to be through external API calls, and the impact is inferred from the ability to execute arbitrary query language statements which can compromise confidentiality, integrity, or availability.

Affected Systems

The vulnerability affects the Sylius eCommerce framework. Versions prior to the following fixes are vulnerable: 1.9.12, 1.10.16, 1.11.17, 1.12.23, 1.13.15, 1.14.18, 2.0.16, 2.1.12, 2.2.3 and earlier. All later releases carry the patch.

Risk and Exploitability

The CVSS score is 5.3, indicating a moderate severity. EPSS is below 1%, implying a low likelihood of exploitation at this time, and the vulnerability is not included in the CISA KEV catalog. Attackers would need to craft a malicious API request to the affected order‑filter endpoints; no additional local privilege or exploitation of other components is required. Based on the description, the attack vector is inferred as an externally reachable API endpoint, and the potential impact is inferred from the arbitrary DQL execution, which could be leveraged to read, modify or delete data from the database, subject to the business logic and other security controls in place.

Generated by OpenCVE AI on April 16, 2026 at 09:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Sylius to at least version 2.2.3 or apply the patch updates corresponding to 1.9.12, 1.10.16, 1.11.17, 1.12.23, 1.13.15, 1.14.18, 2.0.16, 2.1.12, or 2.2.3.
  • If an upgrade is not immediately possible, restrict access to the API endpoints that use ProductPriceOrderFilter and TranslationOrderNameAndLocaleFilter to trusted clients or authenticated users only.
  • Implement input validation that sanitizes or whitelists acceptable order direction values before passing them to Doctrine’s orderBy().

Generated by OpenCVE AI on April 16, 2026 at 09:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-xcwx-r2gw-w93m Sylius has a DQL Injection via API Order Filters
History

Wed, 18 Mar 2026 20:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:sylius:sylius:*:*:*:*:*:*:*:*

Wed, 11 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 11 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Sylius
Sylius sylius
Vendors & Products Sylius
Sylius sylius

Tue, 10 Mar 2026 22:00:00 +0000

Type Values Removed Values Added
Description Sylius is an Open Source eCommerce Framework on Symfony. Sylius API filters ProductPriceOrderFilter and TranslationOrderNameAndLocaleFilter pass user-supplied order direction values directly to Doctrine's orderBy() without validation. An attacker can inject arbitrary DQL. The issue is fixed in versions: 1.9.12, 1.10.16, 1.11.17, 1.12.23, 1.13.15, 1.14.18, 2.0.16, 2.1.12, 2.2.3 and above.
Title Sylius has a DQL Injection via API Order Filters
Weaknesses CWE-89
CWE-943
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-11T15:19:28.740Z

Reserved: 2026-03-09T17:41:56.077Z

Link: CVE-2026-31825

cve-icon Vulnrichment

Updated: 2026-03-11T14:29:20.870Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-10T22:16:20.320

Modified: 2026-03-18T19:48:52.573

Link: CVE-2026-31825

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T09:30:06Z

Weaknesses