Description
Shopware is an open commerce platform. Prior to 6.7.8.1 and 6.6.10.15, an insufficient check on the filter types for unauthenticated customers allows access to orders of other customers. This is part of the deepLinkCode support on the store-api.order endpoint. This vulnerability is fixed in 6.7.8.1 and 6.6.10.15.
Published: 2026-03-11
Score: 8.9 High
EPSS: < 1% Very Low
KEV: No
Impact: Information Disclosure
Action: Immediate Patch
AI Analysis

Impact

Shopware, an open commerce platform, contains a flaw in the deepLinkCode handling of the store-api.order endpoint. The system performs an insufficient check on filter types for unauthenticated users, allowing them to retrieve order data belonging to other customers. This vulnerability can lead to unauthorized disclosure of order details, impacting confidentiality and potentially exposing sensitive customer information. The weakness is identified as CWE-863 (Improper Authorization).

Affected Systems

Relevant Shopware products affected are the core and platform components. Versions released prior to 6.7.8.1 and 6.6.10.15 are susceptible. No further version granularity is provided in the CVE data. Vendors have confirmed that upgrading to 6.7.8.1 or later, or to 6.6.10.15 or later, removes the vulnerability.

Risk and Exploitability

The CVSS v3 score of 8.9 classifies this issue as High severity. The EPSS score is reported as less than 1%, indicating a low probability of widespread exploitation at this time. The vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog. Attackers can exploit it remotely by sending unauthenticated requests to the store‑api.order endpoint; no special privileges or additional credentials are required.

Generated by OpenCVE AI on March 16, 2026 at 23:12 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply vendor patch to Shopware version 6.7.8.1 or later, or to 6.6.10.15 or later.
  • If upgrading is not feasible, block unauthenticated requests to the store-api.order endpoint using network or application‑level restrictions.
  • Temporarily restrict access to the store-api.order endpoint by requiring authentication or limiting user roles.
  • Monitor logs for abnormal activity that might indicate exploitation of the data extraction issue.

Generated by OpenCVE AI on March 16, 2026 at 23:12 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-7vvp-j573-5584 Shopware: Unauthenticated data extraction possible through store-api.order endpoint
History

Mon, 16 Mar 2026 20:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:shopware:shopware:*:*:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Thu, 12 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 12 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Shopware
Shopware platform
Shopware shopware
Vendors & Products Shopware
Shopware platform
Shopware shopware

Wed, 11 Mar 2026 19:00:00 +0000

Type Values Removed Values Added
Description Shopware is an open commerce platform. Prior to 6.7.8.1 and 6.6.10.15, an insufficient check on the filter types for unauthenticated customers allows access to orders of other customers. This is part of the deepLinkCode support on the store-api.order endpoint. This vulnerability is fixed in 6.7.8.1 and 6.6.10.15.
Title Shopware unauthenticated data extraction possible through store-api.order endpoint
Weaknesses CWE-863
References
Metrics cvssV4_0

{'score': 8.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N'}


Subscriptions

Shopware Platform Shopware
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-12T20:02:14.866Z

Reserved: 2026-03-09T21:59:02.687Z

Link: CVE-2026-31887

cve-icon Vulnrichment

Updated: 2026-03-12T20:02:11.688Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-11T19:16:04.950

Modified: 2026-03-16T20:39:53.950

Link: CVE-2026-31887

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T15:29:31Z

Weaknesses