Vulnerability DatabaseGHSA-9v82-vcjx-m76j

GHSA-9v82-vcjx-m76j
PHP vulnerability analysis and mitigation

Overview

A Reflective Cross-Site Scripting (XSS) vulnerability was discovered in Shopware's CMS components, identified as GHSA-9v82-vcjx-m76j. The vulnerability affects Shopware versions 6.7.0.0 through 6.7.2.1 and was patched in version 6.7.2.1. The vulnerability stems from inadequate input validation in the JavaScript variable 'activeRouteParameters', particularly affecting endpoints /page/cms/* and /widget/cms/* (GitHub Advisory).

Technical details

The vulnerability is rated as High severity with a CVSS score of 8.8. The attack vector is Network-based with low attack complexity, requiring no privileges but does need user interaction. The vulnerability is classified as CWE-79 (Improper Neutralization of Input During Web Page Generation). The technical root cause is the lack of proper input validation for user-controllable input that is subsequently used in web page generation (GitHub Advisory).

Impact

The exploitation of this XSS vulnerability enables malicious actors to perform harmful actions in the user's web browser within the session context of the affected user. Critical impacts include the potential theft of user session tokens and the ability to perform administrative actions when an administrative user is affected. The vulnerability is particularly severe because sensitive cookies are not configured with the HttpOnly attribute, and administrator JWTs are stored in sessionStorage (GitHub Advisory).

Mitigation and workarounds

The primary mitigation is to upgrade to Shopware version 6.7.2.1 which contains the security fix. For older versions of 6.7, corresponding security measures are available via a plugin. The vendor strongly recommends updating to the latest Shopware version for the full range of security functions (GitHub Advisory, Shopware Release).

Additional resources


SourceThis report was generated using AI

Related PHP vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-21857HIGH8.3
  • PHPPHP
  • redaxo/source
NoYesJan 07, 2026
CVE-2025-68954HIGH7.5
  • PHPPHP
  • github.com/pterodactyl/wings
NoYesJan 06, 2026
CVE-2025-68456HIGH7
  • PHPPHP
  • cpe:2.3:a:craftcms:craft_cms
NoYesJan 05, 2026
CVE-2025-69197MEDIUM6.5
  • PHPPHP
  • pterodactyl/panel
NoYesJan 06, 2026
CVE-2026-22242MEDIUM4.9
  • PHPPHP
  • coreshop/core-shop
NoYesJan 07, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management