Advisory Database
  • Advisories
  • Dependency Scanning
  1. composer
  2. ›
  3. shopware/platform
  4. ›
  5. CVE-2022-24892

CVE-2022-24892: Weak Password Recovery Mechanism for Forgotten Password

April 28, 2022 (updated May 10, 2022)

Shopware is an open source e-commerce software platform. Starting with version 5.0.4 and before version 5.7.9, multiple tokens for password reset can be requested. All tokens can be used to change the password. This makes it possible for an attacker to take over the victim’s account if they somehow gain access to the victims email account and find an unused password reset token in the emails. This issue is fixed in version 5.7.9.

References

  • docs.shopware.com/en/shopware-5-en/security-updates/security-update-04-2022
  • github.com/shopware/shopware/security/advisories/GHSA-3qrq-r688-vvh4
  • nvd.nist.gov/vuln/detail/CVE-2022-24892
  • www.shopware.com/en/changelog-sw5/

Code Behaviors & Features

Detect and mitigate CVE-2022-24892 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 5.0.4 before 5.7.9

Fixed versions

  • 6.1.0

Solution

Upgrade to version 6.1.0 or above.

Impact 7.5 HIGH

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-640: Weak Password Recovery Mechanism for Forgotten Password

Source file

packagist/shopware/platform/CVE-2022-24892.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:28 +0000.