The perpetrator could query the API v2 Order Status endpoint with an empty string passed as an Order token
Please upgrade to 3.7.11, 4.0.4, or 4.1.11 depending on your used Spree version. Users of Spree < 3.7 are not affected.
Pull request with a fix and in-depth explanation - https://github.com/spree/spree/pull/10573
If you have any questions or comments about this advisory: * Email us at security@spreecommerce.org
{ "nvd_published_at": null, "cwe_ids": [ "CWE-863" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2020-11-13T17:18:00Z" }