{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T01:31:10.407","vulnerabilities":[{"cve":{"id":"CVE-2026-31889","sourceIdentifier":"security-advisories@github.com","published":"2026-03-11T20:16:15.287","lastModified":"2026-03-16T20:18:18.410","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Shopware is an open commerce platform. Prior to 6.6.10.15 and 6.7.8.1, a vulnerability in the Shopware app registration flow that could, under specific conditions, allow attackers to take over the communication channel between a shop and an app. The legacy app registration flow used HMAC‑based authentication without sufficiently binding a shop installation to its original domain. During re‑registration, the shop-url could be updated without proving control over the previously registered shop or domain. This made targeted hijacking of app communication feasible if an attacker possessed the relevant app‑side secret. By abusing app re‑registration, an attacker could redirect app traffic to an attacker‑controlled domain and potentially obtain API credentials intended for the legitimate shop. This vulnerability is fixed in 6.6.10.15 and 6.7.8.1."},{"lang":"es","value":"Shopware es una plataforma de comercio abierta. Antes de las versiones 6.6.10.15 y 6.7.8.1, una vulnerabilidad en el flujo de registro de aplicaciones de Shopware que podría, bajo condiciones específicas, permitir a los atacantes tomar el control del canal de comunicación entre una tienda y una aplicación. El flujo de registro de aplicaciones heredado utilizaba autenticación basada en HMAC sin vincular suficientemente una instalación de tienda a su dominio original. Durante el nuevo registro, la URL de la tienda podría actualizarse sin probar el control sobre la tienda o dominio previamente registrado. Esto hizo factible el secuestro dirigido de la comunicación de la aplicación si un atacante poseía el secreto relevante del lado de la aplicación. Al abusar del nuevo registro de la aplicación, un atacante podría redirigir el tráfico de la aplicación a un dominio controlado por el atacante y potencialmente obtener credenciales de API destinadas a la tienda legítima. Esta vulnerabilidad está corregida en las versiones 6.6.10.15 y 6.7.8.1."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:L","baseScore":8.9,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"LOW"},"exploitabilityScore":2.2,"impactScore":6.0}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-290"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:shopware:shopware:*:*:*:*:*:*:*:*","versionEndExcluding":"6.6.10.15","matchCriteriaId":"C5486B22-79CE-4581-BD61-4CF0E3BFB843"},{"vulnerable":true,"criteria":"cpe:2.3:a:shopware:shopware:*:*:*:*:*:*:*:*","versionStartIncluding":"6.7.0.0","versionEndExcluding":"6.7.8.1","matchCriteriaId":"A198E1E6-E6EE-4D98-BF25-E2A5055E8DC8"}]}]}],"references":[{"url":"https://github.com/shopware/shopware/security/advisories/GHSA-c4p7-rwrg-pf6p","source":"security-advisories@github.com","tags":["Vendor Advisory"]}]}}]}