Description
Craft Commerce is an ecommerce platform for Craft CMS. In versions 4.0.0 through 4.10.2 and 5.0.0 through 5.5.4, the PaymentsController::actionPay discloses some order data to unauthenticated users when an order number is provided and the email check fails during an anonymous payment. The JSON error response includes the serialized order object (order), which contains some sensitive fields such as customer email, shipping address, and billing address. The frontend payment flow's actionPay() retrieves orders by number before authorization is fully enforcedLoad order by number. This issue has been fixed in versions 4.11.0 and 5.6.0.
Published: 2026-04-13
Score: 1.7 Low
EPSS: < 1% Very Low
KEV: No
Impact: Information Disclosure
Action: Patch
AI Analysis

Impact

Craft Commerce, an ecommerce extension for Craft CMS, has a flaw that permits unauthenticated users to retrieve sensitive order data. When an anonymous payment attempt fails due to an email mismatch, the error response includes a serialized order object containing customer email, shipping address, and billing address. This discrepancy between expected authorization and the exposed data can be exploited to gather private customer information.

Affected Systems

The issue affects Craft Commerce installations of version 4.0.0 through 4.10.2 and 5.0.0 through 5.5.4. Community and developer deployments running these versions should verify current version status and consider upgrades.

Risk and Exploitability

The CVSS base score of 1.7 reflects a low impact profile. No EPSS data is available and the vulnerability is not listed in the CISA KEV catalog, indicating limited exploitation evidence. Nonetheless, the entry point is a publicly reachable HTTP endpoint; an attacker can provide an order number and trigger the error response without authentication, suggesting a straightforward remote attack path. Organizations with exposed Craft Commerce sites should treat the flaw as a potential data privacy issue and apply a patch promptly.

Generated by OpenCVE AI on April 13, 2026 at 21:34 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Craft Commerce to version 4.11.0 or later, or 5.6.0 or later
  • Verify that the payment flow no longer exposes order data by testing a failed anonymous payment
  • Monitor for any unusual data disclosure events after the update

Generated by OpenCVE AI on April 13, 2026 at 21:34 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-3vxg-x5f8-f5qf Craft Commerce has an unauthenticated information disclosure that can leak some customer order data on anonymous payments
History

Tue, 14 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Craftcms
Craftcms commerce
Vendors & Products Craftcms
Craftcms commerce

Tue, 14 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 13 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Description Craft Commerce is an ecommerce platform for Craft CMS. In versions 4.0.0 through 4.10.2 and 5.0.0 through 5.5.4, the PaymentsController::actionPay discloses some order data to unauthenticated users when an order number is provided and the email check fails during an anonymous payment. The JSON error response includes the serialized order object (order), which contains some sensitive fields such as customer email, shipping address, and billing address. The frontend payment flow's actionPay() retrieves orders by number before authorization is fully enforcedLoad order by number. This issue has been fixed in versions 4.11.0 and 5.6.0.
Title Craft Commerce: Unauthenticated information disclosure in `commerce/payments/pay` can leak some customer order data on anonymous payments
Weaknesses CWE-200
CWE-862
References
Metrics cvssV4_0

{'score': 1.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U'}


Subscriptions

Craftcms Commerce
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-14T15:25:04.635Z

Reserved: 2026-03-11T15:05:48.399Z

Link: CVE-2026-32270

cve-icon Vulnrichment

Updated: 2026-04-14T15:24:53.471Z

cve-icon NVD

Status : Deferred

Published: 2026-04-13T20:16:33.527

Modified: 2026-04-17T15:26:57.017

Link: CVE-2026-32270

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-14T16:33:25Z

Weaknesses