Advisory Database
  • Advisories
  • Dependency Scanning
  1. composer
  2. ›
  3. shopware/platform
  4. ›
  5. CVE-2023-22731

CVE-2023-22731: Improper Control of Generation of Code ('Code Injection')

January 17, 2023 (updated November 7, 2023)

Shopware is an open source commerce platform based on Symfony Framework and Vue js. In a Twig environment without the Sandbox extension, it is possible to refer to PHP functions in twig filters like map, filter, sort. This allows a template to call any global PHP function and thus execute arbitrary code. The attacker must have access to a Twig environment in order to exploit this vulnerability. This problem has been fixed with 6.4.18.1 with an override of the specified filters until the integration of the Sandbox extension has been finished. Users are advised to upgrade. Users of major versions 6.1, 6.2, and 6.3 may also receive this fix via a plugin.

References

  • docs.shopware.com/en/shopware-6-en/security-updates/security-update-01-2023?category=security-updates
  • github.com/advisories/GHSA-93cw-f5jj-x85w
  • github.com/shopware/platform/commit/89d1ea154689cb6202e0d3a0ceeae0febb0c09e1
  • github.com/shopware/platform/security/advisories/GHSA-93cw-f5jj-x85w

Code Behaviors & Features

Detect and mitigate CVE-2023-22731 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 6.4.18.1

Fixed versions

  • 6.4.18.1

Solution

Upgrade to version 6.4.18.1 or above.

Impact 8.8 HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-94: Improper Control of Generation of Code ('Code Injection')

Source file

packagist/shopware/platform/CVE-2023-22731.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:16:10 +0000.