CVE-2026-25758

Source
https://cve.org/CVERecord?id=CVE-2026-25758
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-25758.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-25758
Aliases
Published
2026-02-06T21:29:20.846Z
Modified
2026-02-09T02:50:51.021413Z
Severity
  • 7.7 (High) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:P CVSS Calculator
Summary
Spree allows unauthenticated users can access all guest addresses
Details

Spree is an open source e-commerce solution built with Ruby on Rails. A critical IDOR vulnerability exists in Spree Commerce's guest checkout flow that allows any guest user to bind arbitrary guest addresses to their order by manipulating address ID parameters. This enables unauthorized access to other guests' personally identifiable information (PII) including names, addresses and phone numbers. The vulnerability bypasses existing ownership validation checks and affects all guest checkout transactions. This vulnerability is fixed in 4.10.3, 5.0.8, 5.1.10, 5.2.7, and 5.3.2.

Database specific
{
    "cwe_ids": [
        "CWE-284",
        "CWE-639"
    ],
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/25xxx/CVE-2026-25758.json"
}
References

Affected packages

Git / github.com/spree/spree

Affected ranges

Type
GIT
Repo
https://github.com/spree/spree
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Database specific
{
    "versions": [
        {
            "introduced": "0"
        },
        {
            "fixed": "4.10.3"
        }
    ]
}
Type
GIT
Repo
https://github.com/spree/spree
Events
Database specific
{
    "versions": [
        {
            "introduced": "5.0.0"
        },
        {
            "fixed": "5.0.8"
        }
    ]
}
Type
GIT
Repo
https://github.com/spree/spree
Events
Database specific
{
    "versions": [
        {
            "introduced": "5.1.0.beta"
        },
        {
            "fixed": "5.1.10"
        }
    ]
}
Type
GIT
Repo
https://github.com/spree/spree
Events
Database specific
{
    "versions": [
        {
            "introduced": "5.2.0.rc1"
        },
        {
            "fixed": "5.2.7"
        }
    ]
}
Type
GIT
Repo
https://github.com/spree/spree
Events
Database specific
{
    "versions": [
        {
            "introduced": "5.3.0.rc2"
        },
        {
            "fixed": "5.3.2"
        }
    ]
}

Affected versions

v0.*
v0.11.0
v0.11.99
v0.2.0
v0.30.0.beta1
v0.4.0
v0.40.0
v0.5.0
v0.7.0
v0.70.0.rc2
v0.8.0
v0.8.1
v0.8.2
v1.*
v1.0.0.rc1
v1.0.0.rc2
v1.0.0.rc3
v1.2.0.rc1
v2.*
v2.4.0.rc1
v2.4.0.rc2
v2.4.0.rc3
v3.*
v3.0.0.rc1
v3.1.0.rc1
v3.2.0.rc1
v3.2.2
v3.3.0
v3.3.0.rc1
v3.3.0.rc2
v3.3.0.rc3
v3.3.0.rc4
v3.4.0
v3.4.0.rc1
v3.4.0.rc2
v3.5.0.rc1
v3.6.0.rc1
v3.7.0.beta
v3.7.0.rc1
v4.*
v4.0.0.beta
v4.1.0
v4.1.0.rc1
v4.1.0.rc2
v4.1.0.rc3
v4.10.0
v4.10.1
v4.10.2
v4.2.0
v4.2.0.beta
v4.2.0.rc1
v4.2.0.rc2
v4.2.0.rc3
v4.2.0.rc4
v4.2.0.rc5
v4.3.0
v4.3.0.rc1
v4.3.0.rc2
v4.3.0.rc3
v4.4.0.rc1
v4.5.0
v4.6.0
v4.7.0
v4.8.0
v4.8.1
v4.8.2
v4.8.3
v4.9.0
v5.*
v5.0.0
v5.0.1
v5.0.2
v5.0.3
v5.0.4
v5.0.5
v5.0.6
v5.0.7
v5.1.0
v5.1.0.beta
v5.1.0.beta2
v5.1.0.beta3
v5.1.0.beta4
v5.1.0.rc1
v5.1.1
v5.1.2
v5.1.3
v5.1.4
v5.1.5
v5.1.6
v5.1.7
v5.1.8
v5.1.9
v5.2.0
v5.2.0.rc1
v5.2.0.rc2
v5.2.0.rc3
v5.2.1
v5.2.2
v5.2.3
v5.2.4
v5.2.5
v5.2.6
v5.3.0
v5.3.0.rc2
v5.3.1

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-25758.json"