{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-15T14:38:46.507","vulnerabilities":[{"cve":{"id":"CVE-2026-25757","sourceIdentifier":"security-advisories@github.com","published":"2026-02-06T23:15:54.527","lastModified":"2026-02-23T17:40:58.347","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Spree is an open source e-commerce solution built with Ruby on Rails. Prior to versions 5.0.8, 5.1.10, 5.2.7, and 5.3.2, unauthenticated users can view completed guest orders by Order ID. This issue may lead to disclosure of PII of guest users (including names, addresses and phone numbers). This issue has been patched in versions 5.0.8, 5.1.10, 5.2.7, and 5.3.2."},{"lang":"es","value":"Spree es una solución de comercio electrónico de código abierto construida con Ruby on Rails. Antes de las versiones 5.0.8, 5.1.10, 5.2.7 y 5.3.2, los usuarios no autenticados pueden ver pedidos de invitados completados mediante el ID de pedido. Este problema puede llevar a la divulgación de PII de usuarios invitados (incluyendo nombres, direcciones y números de teléfono). Este problema ha sido parcheado en las versiones 5.0.8, 5.1.10, 5.2.7 y 5.3.2."}],"metrics":{"cvssMetricV40":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"4.0","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","baseScore":7.7,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"NONE","vulnAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","exploitMaturity":"PROOF_OF_CONCEPT","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED"}}],"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-639"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:spreecommerce:spree:*:*:*:*:*:*:*:*","versionEndExcluding":"5.0.8","matchCriteriaId":"98910FEE-BD94-4433-8F48-2BA39FDFDDB9"},{"vulnerable":true,"criteria":"cpe:2.3:a:spreecommerce:spree:*:*:*:*:*:*:*:*","versionStartIncluding":"5.1.0","versionEndExcluding":"5.1.10","matchCriteriaId":"454F517E-0713-43E7-93A3-5E4B29CCEEB5"},{"vulnerable":true,"criteria":"cpe:2.3:a:spreecommerce:spree:*:*:*:*:*:*:*:*","versionStartIncluding":"5.2.0","versionEndExcluding":"5.2.7","matchCriteriaId":"44109CC9-7DC9-4F90-829A-8C7DBEDD1837"},{"vulnerable":true,"criteria":"cpe:2.3:a:spreecommerce:spree:*:*:*:*:*:*:*:*","versionStartIncluding":"5.3.0","versionEndExcluding":"5.3.2","matchCriteriaId":"06654012-3233-4397-AC59-065A17513649"}]}]}],"references":[{"url":"https://github.com/spree/spree/blob/1341623f2ae92685cdbe232885bf5808fc8f9ca8/storefront/app/controllers/spree/orders_controller.rb#L14","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/spree/spree/blob/1341623f2ae92685cdbe232885bf5808fc8f9ca8/storefront/app/controllers/spree/orders_controller.rb#L51C1-L55C8","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/spree/spree/blob/a878eb4a782ce0445d218ea86fb12075b0e3d7cc/core/lib/spree/core/number_generator.rb#L45","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/spree/spree/commit/3e00be64c128ef4bd4b99731f0c3ab469509cfab","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/spree/spree/commit/6b32ed7d474aa55fa441990e6aa39740152aa1be","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/spree/spree/commit/6f6b8a7a28a8bff24a6e20eab04b4bbbdf39384d","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/spree/spree/commit/ea4a5db590ca753dbc986f2a4e818d9e0edfb1ad","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/spree/spree/security/advisories/GHSA-p6pv-q7rc-g4h9","source":"security-advisories@github.com","tags":["Exploit","Vendor Advisory"]}]}}]}