Advisory Database
  • Advisories
  • Dependency Scanning
  1. composer
  2. ›
  3. shopware/shopware
  4. ›
  5. CVE-2022-36101

CVE-2022-36101: Cleartext Storage of Sensitive Information

September 12, 2022 (updated July 21, 2023)

Shopware is an open source e-commerce software. In affected versions the request for the customer detail view in the backend administration contained sensitive data like the hashed password and the session ID. These fields are now explicitly unset in version 5.7.15. Users are advised to update and may get the update either via the Auto-Updater or directly via the download overview. There are no known workarounds for this issue.

References

  • docs.shopware.com/en/shopware-5-en/security-updates/security-update-09-2022
  • github.com/shopware/shopware/commit/af5cdbc81d60f21b728e1433aeb8837f25938d2a
  • github.com/shopware/shopware/security/advisories/GHSA-6vfq-jmxg-g58r
  • nvd.nist.gov/vuln/detail/CVE-2022-36101
  • packagist.org/packages/shopware/shopware

Code Behaviors & Features

Detect and mitigate CVE-2022-36101 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 5.0.0 before 5.7.15

Fixed versions

  • 5.7.15

Solution

Upgrade to version 5.7.15 or above.

Impact 5.3 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Learn more about CVSS

Source file

packagist/shopware/shopware/CVE-2022-36101.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:16:08 +0000.