A significant SQL injection vulnerability has been identified in the Shopware Security Plugin 6, potentially putting systems at risk.
This flaw affects Shopware environments that use the Security Plugin to patch vulnerabilities in older versions of Shopware, specifically versions prior to 6.5.8.13.
Shopware AG has released fixes, but the issue highlights the persistent risks associated with incomplete security patches in popular e-commerce platforms.
Details of the Vulnerability
The vulnerability, tracked as CVE-2025-27892, resides within the “aggregations” field of the API, particularly when using endpoints such as /api/search/order
.
Attackers can exploit the flaw by injecting malicious SQL commands into the name
field of nested aggregation objects, which remain unsanitized despite recent security fixes.
While the latest patch for the security plugin (version 2.0.11) addresses this issue, previous versions, including 2.0.10, fail to thoroughly sanitize nested fields.
For instance, attackers can inject symbols like ?
or :
into the name
field of nested aggregation objects symbols typically reserved for prepared statements bypassing existing security measures.
The vulnerability also extends to the value
field of the filter
object, which is used as a variable in prepared statements, enabling attackers to craft complex SQL injections.
A proof-of-concept (PoC) demonstrates how an attacker could manipulate the API to execute arbitrary SQL commands.
By inserting payloads such as paid\
FROM `order`; SELECT SLEEP(5); —into the
value` field, attackers can potentially read from or modify the database, execute commands to delay server responses, or even escalate privileges.
Impact on Shopware Users
According to the researchers, this vulnerability poses varying degrees of risk, depending on who has access to the affected APIs.
If attackers gain access to the Shopware Store API or Admin API, they could obtain read and write permissions for the database, allowing them to disclose sensitive information or escalate their privileges.
In environments where the Admin API is exposed, even users with low-privilege accounts could exploit the flaw to compromise the database, which is deemed a medium security risk by security experts.
For Shopware instances where the Store API’s search endpoints are publicly accessible, the risk level becomes markedly higher, as attackers with minimal access could launch SQL injection attacks to compromise the database fully.
Shopware has addressed the issue by releasing version 6.5.8.13, which resolves the flaw independently of the Security Plugin.
For customers unable to upgrade to the latest version of Shopware, the company has provided an updated version of the plugin, Shopware Security Plugin 6 version 2.0.11.
Users are urged to apply these updates immediately to mitigate the risk.
It is important to note, however, that reliance on the Security Plugin as a stopgap for older Shopware versions may leave users vulnerable to similar issues in the future.
Security teams recommend upgrading to the latest stable version of Shopware whenever possible to ensure a more robust security posture.
The vulnerability was first identified on February 12, 2025, and reported to Shopware AG on February 24, 2025.
Shopware implemented a fix by early March and sought approval from security researchers, who validated the fix on March 10, 2025.
However, the advisory and fix were publicly released only on April 8, 2025, after extensive testing and review.
The SQL injection vulnerability in the Shopware Security Plugin serves as a reminder of the risks associated with incomplete security patches.
Shopware users, especially those operating older versions of the platform, are strongly encouraged to patch their systems or upgrade to newer versions to prevent exploitation.
As SQL injection remains one of the most exploited vulnerabilities in web applications, adhering to best practices in API design and input sanitization remains crucial for securing e-commerce environments.
Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates