Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-31867: CWE-639: Authorization Bypass Through User-Controlled Key in craftcms commerce

0
Medium
VulnerabilityCVE-2026-31867cvecve-2026-31867cwe-639
Published: Wed Mar 11 2026 (03/11/2026, 17:52:18 UTC)
Source: CVE Database V5
Vendor/Project: craftcms
Product: commerce

Description

Craft Commerce is an ecommerce platform for Craft CMS. Prior to 4.11.0 and 5.6.0, An Insecure Direct Object Reference (IDOR) vulnerability exists in Craft Commerce’s cart functionality that allows users to hijack any shopping cart by knowing or guessing its 32-character number. The CartController accepts a user-supplied number parameter to load and modify shopping carts. No ownership validation is performed - the code only checks if the order exists and is incomplete, not whether the requester has authorization to access it. This vulnerability enables the takeover of shopping sessions and potential exposure of PII. This vulnerability is fixed in 4.11.0 and 5.6.0.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/18/2026, 19:15:24 UTC

Technical Analysis

Craft Commerce, an ecommerce platform built on Craft CMS, suffered from an authorization bypass vulnerability classified as CWE-639 (Authorization Bypass Through User-Controlled Key). The vulnerability exists in the CartController component, which accepts a user-supplied 32-character 'number' parameter to load and modify shopping carts. Prior to versions 4.11.0 and 5.6.0, the system only verified that the order exists and is incomplete but did not validate whether the requester was authorized to access or modify the cart. This lack of ownership verification allows any attacker who can guess or obtain a valid cart number to hijack the shopping session, manipulate cart contents, and potentially access sensitive customer data including PII. The attack vector is network-based with no privileges or user interaction required, but the attack complexity is high due to the difficulty in guessing valid cart numbers. The vulnerability affects Craft Commerce versions from 4.0.0 up to but not including 4.11.0, and from 5.0.0 up to but not including 5.6.0. The issue was publicly disclosed in March 2026 and has a CVSS 4.0 score of 6.3, reflecting medium severity. No public exploits have been reported, but the risk remains significant for unpatched installations.

Potential Impact

The primary impact of this vulnerability is unauthorized access to and manipulation of shopping carts, which can lead to session hijacking and unauthorized order modifications. Attackers could alter cart contents, potentially causing financial loss or disruption of ecommerce operations. Additionally, exposure of personally identifiable information (PII) stored within the cart or order details could lead to privacy violations and regulatory compliance issues such as GDPR or CCPA breaches. For organizations relying on Craft Commerce, this could damage customer trust and brand reputation. The vulnerability’s exploitation does not require authentication, increasing the risk of automated attacks or mass scanning for valid cart numbers. Although the attack complexity is high, the broad exposure of ecommerce platforms using affected versions worldwide means the potential impact is significant, especially for businesses with large customer bases or sensitive data in their shopping carts.

Mitigation Recommendations

Organizations using Craft Commerce should immediately upgrade to versions 4.11.0 or 5.6.0 or later, where the vulnerability is patched. Until upgrades can be applied, implement strict access controls and monitoring on the CartController endpoints to detect and block suspicious requests with unusual cart number patterns. Employ rate limiting and anomaly detection to prevent brute-force guessing of cart numbers. Review and enhance logging to capture unauthorized access attempts for forensic analysis. Consider additional application-layer protections such as web application firewalls (WAFs) configured to identify and block exploitation attempts targeting cart manipulation. Conduct thorough audits of customer data access controls and ensure minimal PII is stored in shopping carts. Finally, educate development teams on secure coding practices to validate ownership and authorization for sensitive operations.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-09T19:02:25.013Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b1b88b2f860ef9436021cf

Added to database: 3/11/2026, 6:46:35 PM

Last enriched: 3/18/2026, 7:15:24 PM

Last updated: 4/26/2026, 1:52:17 AM

Views: 92

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses