{"api_version":"1","generated_at":"2026-04-23T11:24:34+00:00","cve":"CVE-2022-36101","urls":{"html":"https://cve.report/CVE-2022-36101","api":"https://cve.report/api/cve/CVE-2022-36101.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-36101","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-36101"},"summary":{"title":"CVE-2022-36101","description":"Shopware is an open source e-commerce software. In affected versions the request for the customer detail view in the backend administration contained sensitive data like the hashed password and the session ID. These fields are now explicitly unset in version 5.7.15. Users are advised to update and may get the update either via the Auto-Updater or directly via the download overview. There are no known workarounds for this issue.","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2022-09-12 20:15:00","updated_at":"2023-07-21 19:57:00"},"problem_types":["NVD-CWE-Other"],"metrics":[],"references":[{"url":"https://github.com/shopware/shopware/security/advisories/GHSA-6vfq-jmxg-g58r","name":"https://github.com/shopware/shopware/security/advisories/GHSA-6vfq-jmxg-g58r","refsource":"CONFIRM","tags":[],"title":"Sensitive data in customer module · Advisory · shopware/shopware · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://packagist.org/packages/shopware/shopware","name":"https://packagist.org/packages/shopware/shopware","refsource":"MISC","tags":[],"title":"shopware/shopware - Packagist","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/shopware/shopware/commit/af5cdbc81d60f21b728e1433aeb8837f25938d2a","name":"https://github.com/shopware/shopware/commit/af5cdbc81d60f21b728e1433aeb8837f25938d2a","refsource":"MISC","tags":[],"title":"SW-26909 - adjust customer module · shopware/shopware@af5cdbc · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-09-2022","name":"https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-09-2022","refsource":"MISC","tags":[],"title":"Shopware 5 - Security Updates - Security Update 09/2022","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-36101","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-36101","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"36101","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"shopware","cpe5":"shopware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security-advisories@github.com","ID":"CVE-2022-36101","STATE":"PUBLIC","TITLE":"Sensitive data in backend customer module"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"shopware","version":{"version_data":[{"version_value":"< 5.7.15"}]}}]},"vendor_name":"shopware"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Shopware is an open source e-commerce software. In affected versions the request for the customer detail view in the backend administration contained sensitive data like the hashed password and the session ID. These fields are now explicitly unset in version 5.7.15. Users are advised to update and may get the update either via the Auto-Updater or directly via the download overview. There are no known workarounds for this issue."}]},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":5.4,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-200: Exposure of Sensitive Information to an Unauthorized Actor"}]}]},"references":{"reference_data":[{"name":"https://packagist.org/packages/shopware/shopware","refsource":"MISC","url":"https://packagist.org/packages/shopware/shopware"},{"name":"https://github.com/shopware/shopware/security/advisories/GHSA-6vfq-jmxg-g58r","refsource":"CONFIRM","url":"https://github.com/shopware/shopware/security/advisories/GHSA-6vfq-jmxg-g58r"},{"name":"https://github.com/shopware/shopware/commit/af5cdbc81d60f21b728e1433aeb8837f25938d2a","refsource":"MISC","url":"https://github.com/shopware/shopware/commit/af5cdbc81d60f21b728e1433aeb8837f25938d2a"},{"name":"https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-09-2022","refsource":"MISC","url":"https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-09-2022"}]},"source":{"advisory":"GHSA-6vfq-jmxg-g58r","discovery":"UNKNOWN"}},"nvd":{"publishedDate":"2022-09-12 20:15:00","lastModifiedDate":"2023-07-21 19:57:00","problem_types":["NVD-CWE-Other"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":5.3,"baseSeverity":"MEDIUM"},"exploitabilityScore":3.9,"impactScore":1.4}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:shopware:shopware:*:*:*:*:*:*:*:*","versionStartIncluding":"5.0.0","versionEndExcluding":"5.7.15","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}