Impact
Craft Commerce, an ecommerce extension for Craft CMS, has a flaw that permits unauthenticated users to retrieve sensitive order data. When an anonymous payment attempt fails due to an email mismatch, the error response includes a serialized order object containing customer email, shipping address, and billing address. This discrepancy between expected authorization and the exposed data can be exploited to gather private customer information.
Affected Systems
The issue affects Craft Commerce installations of version 4.0.0 through 4.10.2 and 5.0.0 through 5.5.4. Community and developer deployments running these versions should verify current version status and consider upgrades.
Risk and Exploitability
The CVSS base score of 1.7 reflects a low impact profile. No EPSS data is available and the vulnerability is not listed in the CISA KEV catalog, indicating limited exploitation evidence. Nonetheless, the entry point is a publicly reachable HTTP endpoint; an attacker can provide an order number and trigger the error response without authentication, suggesting a straightforward remote attack path. Organizations with exposed Craft Commerce sites should treat the flaw as a potential data privacy issue and apply a patch promptly.
OpenCVE Enrichment
Github GHSA