VYPR
Low severityNVD Advisory· Published Apr 9, 2025· Updated Apr 9, 2025

Shopware's default newsletter opt-in settings allow for mass sign-up abuse

CVE-2025-32378

Description

Shopware is an open source e-commerce software platform. Prior to 6.6.10.3 or 6.5.8.17, the default settings for double-opt-in allow for mass unsolicited newsletter sign-ups without confirmation. Default settings are Newsletter: Double Opt-in set to active, Newsletter: Double opt-in for registered customers set to disabled, and Log-in & sign-up: Double opt-in on sign-up set to disabled. With these settings, anyone can register an account on the shop using any e-mail-address and then check the check-box in the account page to sign up for the newsletter. The recipient will receive two mails confirming registering and signing up for the newsletter, no confirmation link needed to be clicked for either. In the backend the recipient is set to “instantly active”. This vulnerability is fixed in 6.6.10.3 or 6.5.8.17.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
shopware/corePackagist
>= 6.6.0.0-rc1, < 6.6.10.36.6.10.3
shopware/platformPackagist
>= 6.6.0.0-rc1, < 6.6.10.36.6.10.3
shopware/platformPackagist
>= 6.7.0.0-rc1, < 6.7.0.0-rc26.7.0.0-rc2
shopware/corePackagist
>= 6.7.0.0-rc1, < 6.7.0.0-rc26.7.0.0-rc2
shopware/corePackagist
< 6.5.8.176.5.8.17
shopware/platformPackagist
< 6.5.8.176.5.8.17

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.