Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-31887: CWE-863: Incorrect Authorization in shopware core

0
High
VulnerabilityCVE-2026-31887cvecve-2026-31887cwe-863
Published: Wed Mar 11 2026 (03/11/2026, 18:49:46 UTC)
Source: CVE Database V5
Vendor/Project: shopware
Product: core

Description

CVE-2026-31887 is a high-severity authorization vulnerability in Shopware core versions prior to 6. 7. 8. 1 and 6. 6. 10. 15. It allows unauthenticated users to access orders belonging to other customers via insufficient filtering on the store-api. order endpoint, specifically related to deepLinkCode support. The flaw stems from an incorrect authorization check (CWE-863) that fails to properly restrict access to order data.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/19/2026, 02:16:59 UTC

Technical Analysis

CVE-2026-31887 is an authorization bypass vulnerability identified in the core of Shopware, an open commerce platform widely used for e-commerce solutions. The vulnerability exists in versions >= 6.7.0.0 and < 6.7.8.1, as well as versions prior to 6.6.10.15. It arises due to insufficient validation of filter types applied to unauthenticated customers when accessing the store-api.order endpoint, which supports deepLinkCode functionality. This endpoint is intended to allow customers to retrieve their own orders securely; however, the flawed authorization logic allows attackers to manipulate filter parameters to access orders belonging to other customers without authentication. The vulnerability is classified under CWE-863 (Incorrect Authorization), indicating a failure to enforce proper access controls. The CVSS 4.0 base score is 8.9 (high), reflecting the vulnerability's network attack vector, low attack complexity, no required privileges or user interaction, and a high impact on confidentiality. The vulnerability does not affect integrity or availability but compromises sensitive customer order data. No public exploits have been reported yet, but the flaw's nature makes it a critical privacy risk. The vendor has addressed the issue in versions 6.7.8.1 and 6.6.10.15 by implementing stricter authorization checks on the filter parameters to ensure only authorized users can access order information.

Potential Impact

The primary impact of CVE-2026-31887 is the unauthorized disclosure of customer order information, which can include personal data, purchase history, and potentially payment details depending on the Shopware configuration. This breach of confidentiality can lead to privacy violations, regulatory non-compliance (such as GDPR), reputational damage, and loss of customer trust for affected organizations. Attackers exploiting this vulnerability can harvest sensitive data without authentication, increasing the risk of identity theft, targeted phishing, and fraud. Since the vulnerability affects e-commerce platforms, it can disrupt business operations by undermining customer confidence and triggering legal consequences. Although the vulnerability does not directly affect system integrity or availability, the exposure of sensitive data alone is sufficient to cause significant harm to organizations worldwide that rely on Shopware for their online storefronts.

Mitigation Recommendations

Organizations using Shopware versions prior to 6.7.8.1 or 6.6.10.15 should immediately upgrade to the patched versions to remediate this vulnerability. In addition to patching, administrators should audit access logs for unusual or unauthorized access patterns to the store-api.order endpoint. Implementing Web Application Firewalls (WAFs) with rules to detect and block anomalous API requests targeting order retrieval endpoints can provide temporary protection. Restricting API access to authenticated users where feasible and enforcing strict input validation on filter parameters can reduce exploitation risk. Regularly reviewing and hardening access control policies within Shopware configurations is recommended. Organizations should also ensure compliance with data protection regulations by promptly addressing any data exposure incidents and notifying affected customers as required.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-09T21:59:02.687Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b1bba82f860ef94362bfad

Added to database: 3/11/2026, 6:59:52 PM

Last enriched: 3/19/2026, 2:16:59 AM

Last updated: 4/28/2026, 7:23:50 AM

Views: 92

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses