Vulnerability DatabaseGHSA-9v82-vcjx-m76j

GHSA-9v82-vcjx-m76j
PHP vulnerability analysis and mitigation

Overview

A high-severity Reflective Cross-Site Scripting (XSS) vulnerability was discovered in Shopware CMS components, identified as GHSA-9v82-vcjx-m76j. The vulnerability affects Shopware versions >= 6.7.0.0 and < 6.7.2.1, and was patched in version 6.7.2.1. The issue stems from inadequate input validation in the JavaScript variable 'activeRouteParameters', specifically at the endpoints /page/cms/ and /widget/cms/ (GitHub Advisory).

Technical details

The vulnerability has a CVSS v3.1 score of 8.8 (High), with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:L. The issue is classified as CWE-79 (Improper Neutralization of Input During Web Page Generation). The vulnerability allows malicious actors to inject JavaScript code into URLs, which executes in the user's browser when visited. No user account is required to exploit this vulnerability (GitHub Advisory).

Impact

The exploitation of this XSS vulnerability enables attackers to perform harmful actions in the user's web browser within the session context of the affected user. Critical impacts include the potential theft of session tokens and administrative tokens, particularly concerning since sensitive cookies are not configured with the HttpOnly attribute and administrator JWTs are stored in sessionStorage. Attackers can obtain user session tokens and perform administrative actions when an administrative user is affected (GitHub Advisory).

Mitigation and workarounds

The primary mitigation is to upgrade to Shopware version 6.7.2.1 which contains the security fix. For older versions of 6.7, security measures are available via a plugin. The fix involves properly escaping the JSON output in the storefront template (GitHub Release, GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related PHP vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-54236CRITICAL9.1
  • PHPPHP
  • cpe:2.3:a:adobe:commerce
NoYesSep 09, 2025
GHSA-9v82-vcjx-m76jHIGH8.8
  • PHPPHP
  • shopware/core
NoYesSep 10, 2025
CVE-2025-52277MEDIUM6.1
  • PHPPHP
  • yeswiki/yeswiki
NoNoSep 09, 2025
CVE-2025-58759MEDIUM5.1
  • PHPPHP
  • datahihi1/tiny-env
NoYesSep 09, 2025
CVE-2025-58758MEDIUM5.1
  • PHPPHP
  • datahihi1/tiny-env
NoYesSep 09, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management