Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-31887: CWE-863: Incorrect Authorization in shopware core

0
High
VulnerabilityCVE-2026-31887cvecve-2026-31887cwe-863
Published: Wed Mar 11 2026 (03/11/2026, 18:49:46 UTC)
Source: CVE Database V5
Vendor/Project: shopware
Product: core

Description

Shopware is an open commerce platform. Prior to 6.7.8.1 and 6.6.10.15, an insufficient check on the filter types for unauthenticated customers allows access to orders of other customers. This is part of the deepLinkCode support on the store-api.order endpoint. This vulnerability is fixed in 6.7.8.1 and 6.6.10.15.

AI-Powered Analysis

AILast updated: 03/11/2026, 19:14:05 UTC

Technical Analysis

CVE-2026-31887 is an authorization bypass vulnerability in the Shopware open commerce platform core, identified as CWE-863 (Incorrect Authorization). The issue affects Shopware versions >= 6.7.0.0 and < 6.7.8.1, as well as versions prior to 6.6.10.15. The vulnerability arises from insufficient validation of filter types applied to unauthenticated customers when accessing the store-api.order endpoint, particularly involving the deepLinkCode feature. This flaw allows attackers to retrieve order information belonging to other customers without authentication or user interaction. The vulnerability is remotely exploitable over the network with low attack complexity and no privileges required. The CVSS v4.0 score of 8.9 reflects the high impact on confidentiality, as unauthorized access to sensitive order data can lead to privacy violations and potential downstream attacks such as fraud or identity theft. The vulnerability does not affect integrity or availability. Shopware has fixed the issue in versions 6.7.8.1 and 6.6.10.15 by implementing proper authorization checks to ensure that only authorized users can access their respective order data. No public exploits have been reported yet, but the nature of the flaw makes it a critical concern for e-commerce platforms relying on Shopware.

Potential Impact

The primary impact of CVE-2026-31887 is the unauthorized disclosure of customer order information, which can include personal data, purchase history, and potentially sensitive transactional details. This breach of confidentiality can erode customer trust, lead to regulatory compliance violations (such as GDPR), and expose organizations to legal liabilities. Attackers could leverage stolen order data for targeted phishing, social engineering, or financial fraud. Since the vulnerability requires no authentication and can be exploited remotely, it significantly increases the attack surface for malicious actors. Organizations running affected Shopware versions risk large-scale data leakage, especially if their e-commerce platforms handle high volumes of transactions. Although the vulnerability does not directly affect system integrity or availability, the reputational damage and potential financial losses from data breaches can be substantial.

Mitigation Recommendations

Organizations should immediately upgrade Shopware core to versions 6.7.8.1 or 6.6.10.15 or later, where the vulnerability is patched. If immediate upgrading is not feasible, implement strict network-level access controls to restrict access to the store-api.order endpoint, limiting it to authenticated and authorized users only. Conduct thorough audits of API access logs to detect any anomalous or unauthorized requests targeting order data. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests exploiting deepLinkCode parameters. Additionally, review and enhance authorization logic in custom Shopware extensions or integrations to prevent similar flaws. Regularly monitor threat intelligence feeds for any emerging exploits related to this CVE. Finally, ensure compliance with data protection regulations by promptly notifying affected customers and authorities in case of data exposure.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-09T21:59:02.687Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b1bba82f860ef94362bfad

Added to database: 3/11/2026, 6:59:52 PM

Last enriched: 3/11/2026, 7:14:05 PM

Last updated: 3/13/2026, 9:27:51 PM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses