CVE-2025-32378 – shopware/core
Package
Manager: composer
Name: shopware/core
Vulnerable Version: >=6.6.0.0-rc1 <6.6.10.3 || >=6.7.0.0-rc1 <6.7.0.0-rc2 || >=0 <6.5.8.17
Severity
Level: Low
CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:R
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N/E:U
EPSS: 0.0002 pctl0.03653
Details
Shopware default newsletter opt-in settings allow for mass sign-up abuse ### Impact Currently the default settings for double-opt-in allow for mass unsolicited newsletter sign-ups without confirmation. Default settings are: Newsletter: Double Opt-in - active Newsletter: Double opt-in for registered customers - disabled Log-in & sign-up: Double opt-in on sign-up - disabled With these settings, anyone can register an account on the shop using any e-mail-address and then check the check-box in the account page to sign up for the newsletter. The recipient will receive two mails confirming registering and signing up for the newsletter, no confirmation link needed to be clicked for either. In the backend the recipient is set to “instantly active”. ### Patches Update to Shopware 6.6.10.3 or 6.5.8.17 ### Workarounds For older versions of 6.4, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.
Metadata
Created: 2025-04-09T13:53:11Z
Modified: 2025-04-09T20:15:17Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/04/GHSA-4h9w-7vfp-px8m/GHSA-4h9w-7vfp-px8m.json
CWE IDs: ["CWE-1188"]
Alternative ID: GHSA-4h9w-7vfp-px8m
Finding: F164
Auto approve: 1