Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-24746: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in shopware platform

0
Medium
Published: Wed Mar 09 2022 (03/09/2022, 22:25:23 UTC)
Source: CVE
Vendor/Project: shopware
Product: platform

Description

Shopware is an open commerce platform based on the Symfony php Framework and the Vue javascript framework. In affected versions it is possible to inject code via the voucher code form. This issue has been patched in version 6.4.8.1. There are no known workarounds for this issue.

AI-Powered Analysis

AILast updated: 06/23/2025, 14:44:14 UTC

Technical Analysis

CVE-2022-24746 is a medium-severity Cross-Site Scripting (XSS) vulnerability affecting the Shopware platform, an open commerce solution built on the Symfony PHP framework and Vue.js. The vulnerability arises from improper neutralization of user input during web page generation, specifically via the voucher code form. In affected versions prior to 6.4.8.1, attackers can inject malicious scripts into the voucher code input field, which are then rendered and executed in the context of the victim's browser. This can lead to theft of session cookies, user impersonation, defacement, or redirection to malicious sites. The issue is classified under CWE-79, indicating failure to properly sanitize or encode input before outputting it to the web page. The vulnerability was publicly disclosed on March 9, 2022, and has been patched in Shopware version 6.4.8.1. No known workarounds exist, and no exploits have been observed in the wild to date. The vulnerability requires no authentication but does require user interaction in the form of visiting a crafted page or submitting a malicious voucher code. Since Shopware is widely used by e-commerce businesses, the vulnerability poses a risk to both the platform operators and their customers, potentially enabling attackers to compromise user accounts or conduct phishing attacks within the trusted domain.

Potential Impact

For European organizations, especially those operating e-commerce websites using Shopware versions prior to 6.4.8.1, this vulnerability can lead to significant reputational damage and financial loss. Successful exploitation could allow attackers to hijack user sessions, steal sensitive customer data, or manipulate transactions. This undermines customer trust and may lead to regulatory scrutiny under GDPR, particularly if personal data is compromised. The vulnerability also increases the risk of fraudulent activities and could be leveraged as a foothold for further attacks within the corporate network. Given the widespread adoption of Shopware in Europe, especially among small and medium-sized enterprises (SMEs) in retail and services sectors, the impact could be broad. The lack of known exploits reduces immediate risk, but the ease of exploitation and absence of workarounds mean that unpatched systems remain vulnerable to opportunistic attackers.

Mitigation Recommendations

Organizations should immediately verify their Shopware platform version and upgrade to version 6.4.8.1 or later to apply the official patch. Since no workarounds exist, patching is the primary mitigation. Additionally, organizations should implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts, reducing the impact of potential XSS attacks. Web Application Firewalls (WAFs) can be configured with custom rules to detect and block suspicious input patterns targeting the voucher code form. Regular security audits and input validation reviews should be conducted to identify and remediate similar vulnerabilities proactively. User education on phishing risks and monitoring for unusual account activities can help detect exploitation attempts. Finally, logging and alerting mechanisms should be enhanced to capture anomalous voucher code submissions or script execution attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-02-10T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9842c4522896dcbf275f

Added to database: 5/21/2025, 9:09:22 AM

Last enriched: 6/23/2025, 2:44:14 PM

Last updated: 2/3/2026, 1:10:15 AM

Views: 52

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats