Vulnerability Description
Shopware is an open commerce platform. Versions 6.4.6.0 through 6.6.10.9 and 6.7.0.0 through 6.7.5.0 have a Reflected XSS vulnerability in AuthController.php. A request parameter from the login page URL is directly rendered within the Twig template of the Storefront login page without further processing or input validation. This allows direct code injection into the template via the URL parameter, waitTime, which lacks proper input validation. This issue is fixed in versions 6.6.10.10 and 6.7.5.1.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Shopware | Shopware | >= 6.4.6.0, < 6.6.10.10 |
Related Weaknesses (CWE)
References
- https://github.com/shopware/shopware/commit/c9242c02c84595d9fa3e2adf6a264bc90a65Patch
- https://github.com/shopware/shopware/security/advisories/GHSA-6w82-v552-wjw2Vendor Advisory
FAQ
What is CVE-2025-67648?
CVE-2025-67648 is a vulnerability with a CVSS score of 7.1 (HIGH). Shopware is an open commerce platform. Versions 6.4.6.0 through 6.6.10.9 and 6.7.0.0 through 6.7.5.0 have a Reflected XSS vulnerability in AuthController.php. A request parameter from the login page U...
How severe is CVE-2025-67648?
CVE-2025-67648 has been rated HIGH with a CVSS base score of 7.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-67648?
Check the references section above for vendor advisories and patch information. Affected products include: Shopware Shopware.