CoreShop Vulnerable to SQL Injection via Admin customer-company-modifier
Description
CoreShop is a Pimcore enhanced eCommerce solution. An error-based SQL Injection vulnerability was identified in versions prior to 4.1.9 in the CustomerTransformerController within the CoreShop admin panel. The affected endpoint improperly interpolates user-supplied input into a SQL query, leading to database error disclosure and potential data extraction. Version 4.1.9 fixes the issue.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
An error-based SQL injection in CoreShop's admin panel allows authenticated admins to extract data via a vulnerable customer-company-modifier endpoint.
Vulnerability
Analysis
An error-based SQL injection (SQLi) vulnerability exists in CoreShop versions prior to 4.1.9, specifically within the CustomerTransformerController of the admin panel [1][2]. The affected endpoint /admin/coreshop/customer-company-modifier/duplication-name-check accepts a value parameter that is directly interpolated into a sprintf statement: sprintf('name LIKE "%%%s%%"', (string) $value) [2]. This lack of parameterization or escaping allows an attacker to break out of the string context and inject arbitrary SQL commands.
Attack
Vector
The vulnerability is exploitable by any authenticated admin user; default credentials (admin/coreshop) are often used in demonstration environments, making exploitation straightforward if passwords are not changed [2]. By sending a crafted request to the duplication-name-check endpoint with a malicious value parameter (e.g., containing a double-quote character), an attacker can trigger SQL syntax errors. These errors confirm the injection point and can be leveraged to extract database content from the database through the error messages themselves.
Impact
An authenticated attacker exploiting this flaw can read sensitive database information, potentially data from the underlying database by observing error-based responses [1][2]. The vulnerability is classified as MEDIUM severity due to the need for admin authentication, but the exposure of customer information, order details, or other business data from the Pimcore-backed eCommerce platform could have serious privacy and compliance repercussions [2].
Remediation
The CoreShop project released version 4.1.9, which addresses the issue by fixing the vulnerable endpoint [3][4]. Users are strongly advised to update immediately. No workarounds have been published; however, restricting access to the admin panel and enforcing strong authentication policies can reduce exposure pending the update [1][2].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
coreshop/core-shopPackagist | < 4.1.9 | 4.1.9 |
Affected products
2Patches
1af80b8f5c7dfFix Injection in CustomerTransformerController
1 file changed · +1 −1
src/CoreShop/Bundle/CoreBundle/Controller/CustomerTransformerController.php+1 −1 modified@@ -41,7 +41,7 @@ public function checkForNameDuplicatesAction(Request $request): JsonResponse if ($value !== null) { $list = $this->getCompanyRepository()->getList(); - $list->addConditionParam(sprintf('name LIKE "%%%s%%"', (string) $value)); + $list->addConditionParam('name LIKE ?', '%' . $value . '%'); $foundObjects = $list->getData(); }
Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
5- github.com/advisories/GHSA-fqcv-8859-86x2ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-23959ghsaADVISORY
- github.com/coreshop/CoreShop/commit/af80b8f5c7df5f02f44e9c5e0a4a564de274eec2ghsax_refsource_MISCWEB
- github.com/coreshop/CoreShop/releases/tag/4.1.9ghsax_refsource_MISCWEB
- github.com/coreshop/CoreShop/security/advisories/GHSA-fqcv-8859-86x2ghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.