Home

Description

Shopware is an open commerce platform. Prior to 6.6.10.15 and 6.7.8.1, a vulnerability in the Shopware app registration flow that could, under specific conditions, allow attackers to take over the communication channel between a shop and an app. The legacy app registration flow used HMAC‑based authentication without sufficiently binding a shop installation to its original domain. During re‑registration, the shop-url could be updated without proving control over the previously registered shop or domain. This made targeted hijacking of app communication feasible if an attacker possessed the relevant app‑side secret. By abusing app re‑registration, an attacker could redirect app traffic to an attacker‑controlled domain and potentially obtain API credentials intended for the legitimate shop. This vulnerability is fixed in 6.6.10.15 and 6.7.8.1.

PUBLISHED Reserved 2026-03-09 | Published 2026-03-11 | Updated 2026-03-12 | Assigner GitHub_M




HIGH: 8.9CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:L

Problem types

CWE-290: Authentication Bypass by Spoofing

Product status

>= 6.7.0.0, < 6.7.8.1
affected

< 6.6.10.15
affected

>= 6.7.0.0, < 6.7.8.1
affected

< 6.6.10.15
affected

References

github.com/...opware/security/advisories/GHSA-c4p7-rwrg-pf6p

cve.org (CVE-2026-31889)

nvd.nist.gov (CVE-2026-31889)

Download JSON