CVE-2026-31887

Source
https://cve.org/CVERecord?id=CVE-2026-31887
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-31887.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-31887
Aliases
Published
2026-03-11T18:49:46.294Z
Modified
2026-03-14T13:45:50.228917Z
Severity
  • 8.9 (High) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N CVSS Calculator
Summary
Shopware unauthenticated data extraction possible through store-api.order endpoint
Details

Shopware is an open commerce platform. Prior to 6.7.8.1 and 6.6.10.15, an insufficient check on the filter types for unauthenticated customers allows access to orders of other customers. This is part of the deepLinkCode support on the store-api.order endpoint. This vulnerability is fixed in 6.7.8.1 and 6.6.10.15.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/31xxx/CVE-2026-31887.json",
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
        "CWE-863"
    ]
}
References

Affected packages

Git / github.com/shopware/shopware

Affected ranges

Type
GIT
Repo
https://github.com/shopware/shopware
Events
Database specific
{
    "versions": [
        {
            "introduced": "6.7.0.0"
        },
        {
            "fixed": "6.7.8.1"
        }
    ]
}
Type
GIT
Repo
https://github.com/shopware/shopware
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Database specific
{
    "versions": [
        {
            "introduced": "0"
        },
        {
            "fixed": "6.6.10.15"
        }
    ]
}

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-31887.json"