We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-32378

Shopware's default newsletter opt-in settings allow for mass sign-up abuse



Description

Shopware is an open source e-commerce software platform. Prior to 6.6.10.3 or 6.5.8.17, the default settings for double-opt-in allow for mass unsolicited newsletter sign-ups without confirmation. Default settings are Newsletter: Double Opt-in set to active, Newsletter: Double opt-in for registered customers set to disabled, and Log-in & sign-up: Double opt-in on sign-up set to disabled. With these settings, anyone can register an account on the shop using any e-mail-address and then check the check-box in the account page to sign up for the newsletter. The recipient will receive two mails confirming registering and signing up for the newsletter, no confirmation link needed to be clicked for either. In the backend the recipient is set to “instantly active”. This vulnerability is fixed in 6.6.10.3 or 6.5.8.17.

Reserved 2025-04-06 | Published 2025-04-09 | Updated 2025-04-09 | Assigner GitHub_M


MEDIUM: 6.9CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-799: Improper Control of Interaction Frequency

Product status

< 6.5.8.17
affected

>= 6.6.0.0, < 6.6.10.3
affected

>= 6.7.0.0-rc1, < 6.7.0.0-rc2
affected

References

github.com/...opware/security/advisories/GHSA-4h9w-7vfp-px8m

cve.org (CVE-2025-32378)

nvd.nist.gov (CVE-2025-32378)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-32378

Support options

Helpdesk Chat, Email, Knowledgebase