VYPR
Moderate severityOSV Advisory· Published Jan 22, 2026· Updated Jan 22, 2026

CoreShop Vulnerable to SQL Injection via Admin customer-company-modifier

CVE-2026-23959

Description

CoreShop is a Pimcore enhanced eCommerce solution. An error-based SQL Injection vulnerability was identified in versions prior to 4.1.9 in the CustomerTransformerController within the CoreShop admin panel. The affected endpoint improperly interpolates user-supplied input into a SQL query, leading to database error disclosure and potential data extraction. Version 4.1.9 fixes the issue.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

An error-based SQL injection in CoreShop's admin panel allows authenticated admins to extract data via a vulnerable customer-company-modifier endpoint.

Vulnerability

Analysis

An error-based SQL injection (SQLi) vulnerability exists in CoreShop versions prior to 4.1.9, specifically within the CustomerTransformerController of the admin panel [1][2]. The affected endpoint /admin/coreshop/customer-company-modifier/duplication-name-check accepts a value parameter that is directly interpolated into a sprintf statement: sprintf('name LIKE "%%%s%%"', (string) $value) [2]. This lack of parameterization or escaping allows an attacker to break out of the string context and inject arbitrary SQL commands.

Attack

Vector

The vulnerability is exploitable by any authenticated admin user; default credentials (admin/coreshop) are often used in demonstration environments, making exploitation straightforward if passwords are not changed [2]. By sending a crafted request to the duplication-name-check endpoint with a malicious value parameter (e.g., containing a double-quote character), an attacker can trigger SQL syntax errors. These errors confirm the injection point and can be leveraged to extract database content from the database through the error messages themselves.

Impact

An authenticated attacker exploiting this flaw can read sensitive database information, potentially data from the underlying database by observing error-based responses [1][2]. The vulnerability is classified as MEDIUM severity due to the need for admin authentication, but the exposure of customer information, order details, or other business data from the Pimcore-backed eCommerce platform could have serious privacy and compliance repercussions [2].

Remediation

The CoreShop project released version 4.1.9, which addresses the issue by fixing the vulnerable endpoint [3][4]. Users are strongly advised to update immediately. No workarounds have been published; however, restricting access to the admin panel and enforcing strong authentication policies can reduce exposure pending the update [1][2].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
coreshop/core-shopPackagist
< 4.1.94.1.9

Affected products

2
  • Coreshop/CoreshopOSV2 versions
    1.0.0, 1.0.1, 1.0.2, …+ 1 more
    • (no CPE)range: 1.0.0, 1.0.1, 1.0.2, …
    • (no CPE)range: <4.1.9

Patches

1
af80b8f5c7df

Fix Injection in CustomerTransformerController

https://github.com/coreshop/CoreShopDominik PfaffenbauerJan 19, 2026via ghsa
1 file changed · +1 1
  • src/CoreShop/Bundle/CoreBundle/Controller/CustomerTransformerController.php+1 1 modified
    @@ -41,7 +41,7 @@ public function checkForNameDuplicatesAction(Request $request): JsonResponse
     
             if ($value !== null) {
                 $list = $this->getCompanyRepository()->getList();
    -            $list->addConditionParam(sprintf('name LIKE "%%%s%%"', (string) $value));
    +            $list->addConditionParam('name LIKE ?', '%' . $value . '%');
                 $foundObjects = $list->getData();
             }
     
    

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

5

News mentions

0

No linked articles in our index yet.