Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-7vvp-j573-5584 | Shopware: Unauthenticated data extraction possible through store-api.order endpoint |
Mon, 16 Mar 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:shopware:shopware:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Thu, 12 Mar 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 12 Mar 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Shopware
Shopware platform Shopware shopware |
|
| Vendors & Products |
Shopware
Shopware platform Shopware shopware |
Wed, 11 Mar 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Shopware is an open commerce platform. Prior to 6.7.8.1 and 6.6.10.15, an insufficient check on the filter types for unauthenticated customers allows access to orders of other customers. This is part of the deepLinkCode support on the store-api.order endpoint. This vulnerability is fixed in 6.7.8.1 and 6.6.10.15. | |
| Title | Shopware unauthenticated data extraction possible through store-api.order endpoint | |
| Weaknesses | CWE-863 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-12T20:02:14.866Z
Reserved: 2026-03-09T21:59:02.687Z
Link: CVE-2026-31887
Updated: 2026-03-12T20:02:11.688Z
Status : Analyzed
Published: 2026-03-11T19:16:04.950
Modified: 2026-03-16T20:39:53.950
Link: CVE-2026-31887
No data.
OpenCVE Enrichment
Updated: 2026-03-20T15:29:31Z
Github GHSA