Shopware up to 6.10.14/7.8.0 /api/_info/config information disclosure
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 5.2 | $0-$5k | 0.00 |
Summary
A vulnerability classified as problematic has been found in Shopware up to 6.10.14/7.8.0. This issue affects some unknown processing of the file /api/_info/config. The manipulation leads to information disclosure. This vulnerability is listed as CVE-2026-32142. The attack may be initiated remotely. There is no available exploit. It is recommended to upgrade the affected component.
Details
A vulnerability was found in Shopware up to 6.10.14/7.8.0. It has been rated as problematic. This issue affects some unknown processing of the file /api/_info/config. The manipulation with an unknown input leads to a information disclosure vulnerability. Using CWE to declare the problem leads to CWE-200. The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. Impacted is confidentiality. The summary by CVE is:
Shopware is an open commerce platform. /api/_info/config route exposes information about licenses. This vulnerability is fixed in 7.8.1 and 6.10.15.
It is possible to read the advisory at github.com. The identification of this vulnerability is CVE-2026-32142 since 03/10/2026. The exploitation is known to be easy. The attack may be initiated remotely. No form of authentication is needed for a successful exploitation. Technical details of the vulnerability are known, but there is no available exploit. The attack technique deployed by this issue is T1592 according to MITRE ATT&CK.
Upgrading to version 6.10.15 or 7.8.1 eliminates this vulnerability.
If you want to get the best quality for vulnerability data then you always have to consider VulDB.
Product
Name
Version
- 6.10.0
- 6.10.1
- 6.10.2
- 6.10.3
- 6.10.4
- 6.10.5
- 6.10.6
- 6.10.7
- 6.10.8
- 6.10.9
- 6.10.10
- 6.10.11
- 6.10.12
- 6.10.13
- 6.10.14
- 7.0
- 7.1
- 7.2
- 7.3
- 7.4
- 7.5
- 7.6
- 7.7
- 7.8.0
License
Website
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔒VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 5.3VulDB Meta Temp Score: 5.2
VulDB Base Score: 5.3
VulDB Temp Score: 5.1
VulDB Vector: 🔒
VulDB Reliability: 🔍
CNA Base Score: 5.3
CNA Vector (GitHub_M): 🔒
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔒
VulDB Temp Score: 🔒
VulDB Reliability: 🔍
Exploiting
Class: Information disclosureCWE: CWE-200 / CWE-284 / CWE-266
CAPEC: 🔒
ATT&CK: 🔒
Physical: No
Local: No
Remote: Yes
Availability: 🔒
Status: Not defined
EPSS Score: 🔒
EPSS Percentile: 🔒
Price Prediction: 🔍
Current Price Estimation: 🔒
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔒
Upgrade: Shopware 6.10.15/7.8.1
Timeline
03/10/2026 CVE reserved03/12/2026 Advisory disclosed
03/12/2026 VulDB entry created
03/12/2026 VulDB entry last update
Sources
Product: github.comAdvisory: GHSA-gvmv-9f74-mhwp
Status: Confirmed
CVE: CVE-2026-32142 (🔒)
GCVE (CVE): GCVE-0-2026-32142
GCVE (VulDB): GCVE-100-350783
Entry
Created: 03/12/2026 21:58Changes: 03/12/2026 21:58 (64)
Complete: 🔍
Cache ID: 216:6F2:103
No comments yet. Languages: en.
Please log in to comment.