{"api_version":"1","generated_at":"2026-04-23T11:26:34+00:00","cve":"CVE-2022-36102","urls":{"html":"https://cve.report/CVE-2022-36102","api":"https://cve.report/api/cve/CVE-2022-36102.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-36102","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-36102"},"summary":{"title":"CVE-2022-36102","description":"Shopware is an open source e-commerce software. In affected versions if backend admin controllers are called with a certain notation, the ACL could be bypassed. Users could execute actions, which they are normally not able to do. Users are advised to update to the current version (5.7.15). Users can get the update via the Auto-Updater or directly via the download overview. There are no known workarounds for this issue.","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2022-09-12 20:15:00","updated_at":"2022-09-15 18:45:00"},"problem_types":["CWE-281"],"metrics":[],"references":[{"url":"https://packagist.org/packages/shopware/shopware","name":"https://packagist.org/packages/shopware/shopware","refsource":"MISC","tags":[],"title":"shopware/shopware - Packagist","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/shopware/shopware/security/advisories/GHSA-qc43-pgwq-3q2q","name":"https://github.com/shopware/shopware/security/advisories/GHSA-qc43-pgwq-3q2q","refsource":"CONFIRM","tags":[],"title":"ACL could be bypassed if specific URLs are used · Advisory · shopware/shopware · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/shopware/shopware/commit/de92d3a78279119a5bbe203054f8fa1d25126af6","name":"https://github.com/shopware/shopware/commit/de92d3a78279119a5bbe203054f8fa1d25126af6","refsource":"MISC","tags":[],"title":"SW-26913 - improve backend · shopware/shopware@de92d3a · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-09-2022","name":"https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-09-2022","refsource":"MISC","tags":[],"title":"Shopware 5 - Security Updates - Security Update 09/2022","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-36102","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-36102","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"36102","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"shopware","cpe5":"shopware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security-advisories@github.com","ID":"CVE-2022-36102","STATE":"PUBLIC","TITLE":"Acess control list bypassed via crafted specific URLs"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"shopware","version":{"version_data":[{"version_value":"< 5.7.15"}]}}]},"vendor_name":"shopware"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Shopware is an open source e-commerce software. In affected versions if backend admin controllers are called with a certain notation, the ACL could be bypassed. Users could execute actions, which they are normally not able to do. Users are advised to update to the current version (5.7.15). Users can get the update via the Auto-Updater or directly via the download overview. There are no known workarounds for this issue."}]},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"LOW","baseScore":6.3,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-281: Improper Preservation of Permissions"}]}]},"references":{"reference_data":[{"name":"https://packagist.org/packages/shopware/shopware","refsource":"MISC","url":"https://packagist.org/packages/shopware/shopware"},{"name":"https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-09-2022","refsource":"MISC","url":"https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-09-2022"},{"name":"https://github.com/shopware/shopware/security/advisories/GHSA-qc43-pgwq-3q2q","refsource":"CONFIRM","url":"https://github.com/shopware/shopware/security/advisories/GHSA-qc43-pgwq-3q2q"},{"name":"https://github.com/shopware/shopware/commit/de92d3a78279119a5bbe203054f8fa1d25126af6","refsource":"MISC","url":"https://github.com/shopware/shopware/commit/de92d3a78279119a5bbe203054f8fa1d25126af6"}]},"source":{"advisory":"GHSA-qc43-pgwq-3q2q","discovery":"UNKNOWN"}},"nvd":{"publishedDate":"2022-09-12 20:15:00","lastModifiedDate":"2022-09-15 18:45:00","problem_types":["CWE-281"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.2,"baseSeverity":"HIGH"},"exploitabilityScore":1.2,"impactScore":5.9}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:shopware:shopware:*:*:*:*:*:*:*:*","versionStartIncluding":"5.0.0","versionEndExcluding":"5.7.15","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}