
Cloud Vulnerability DB
A community-led vulnerabilities database
Shopware, an open headless commerce platform, disclosed a vulnerability (CVE-2024-22407) in its CMS state handler for orders. The vulnerability was discovered and disclosed on January 16, 2024, affecting all versions prior to 6.5.7.4. The issue stems from insufficient verification of user authorizations for actions that modify payment, delivery, and order status (GitHub Advisory).
The vulnerability is classified with a CVSS v3.1 Base Score of 6.5 (Medium) with the vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N. The issue is categorized as CWE-284 (Improper Access Control). The core problem lies in the state handler's failure to properly verify user authorizations, allowing users without proper 'write' permissions to modify order states (NVD).
The vulnerability allows unauthorized users to modify order states despite lacking the necessary 'write' permissions. This could lead to unauthorized changes to payment, delivery, and order status information, potentially compromising the integrity of order management systems (GitHub Advisory).
Users are advised to update to Shopware version 6.5.7.4 which contains the fix for this vulnerability. For older versions (6.1, 6.2, 6.3, and 6.4), corresponding security measures are available via a plugin. For optimal security and functionality, updating to the latest Shopware version is recommended (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."