CVE-2025-67648

7.1 HIGH

📋 TL;DR

This CVE describes a reflected cross-site scripting (XSS) vulnerability in Shopware's login page. Attackers can inject malicious JavaScript via the waitTime URL parameter, which gets executed in victims' browsers when they visit a crafted login URL. All Shopware instances running affected versions with the default login page are vulnerable.

💻 Affected Systems

Products:
  • Shopware
Versions: 6.4.6.0 through 6.6.10.9 and 6.7.0.0 through 6.7.5.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the Storefront login page; admin backend is not affected. Requires user interaction (clicking malicious link).

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator session cookies, perform actions as authenticated users, redirect to phishing sites, or install malware on client systems.

🟠

Likely Case

Session hijacking of users who click malicious links, credential theft via fake login forms, or defacement of the login page.

🟢

If Mitigated

With proper input validation and output encoding, malicious scripts would be rendered harmless as plain text.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple reflected XSS requiring only a crafted URL; no authentication needed. Likely to be weaponized due to low complexity.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.6.10.10 and 6.7.5.1

Vendor Advisory: https://github.com/shopware/shopware/security/advisories/GHSA-6w82-v552-wjw2

Restart Required: No

Instructions:

1. Update Shopware to version 6.6.10.10 (if on 6.6.x) or 6.7.5.1 (if on 6.7.x). 2. For older versions (6.4.x-6.5.x), upgrade to a supported version first. 3. Apply the patch via composer update or manual update from GitHub.

🔧 Temporary Workarounds

Input Validation via Web Application Firewall

all

Block or sanitize the waitTime parameter at the WAF/load balancer level.

Depends on WAF platform; configure rule to sanitize/block waitTime parameter containing script tags or JavaScript.

Content Security Policy

all

Implement strict CSP headers to prevent script execution from untrusted sources.

Add header: Content-Security-Policy: script-src 'self'

🧯 If You Can't Patch

  • Implement WAF rules to block malicious waitTime parameter values containing script tags or JavaScript patterns.
  • Monitor access logs for suspicious URLs containing waitTime parameter with script-like content.

🔍 How to Verify

Check if Vulnerable:

Test by accessing login page with waitTime parameter containing simple XSS payload like: /account/login?waitTime=<script>alert(1)</script>

Check Version:

php bin/console system:info | grep 'Shopware version'

Verify Fix Applied:

After patching, test with same payload; script should be rendered as plain text, not executed.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to /account/login with waitTime parameter containing script tags, JavaScript functions, or encoded payloads.

Network Indicators:

  • URLs with waitTime parameter exceeding normal length or containing suspicious characters.

SIEM Query:

web.url:*waitTime=* AND (web.url:*<script* OR web.url:*javascript:* OR web.url:*%3Cscript*)

🔗 References

📤 Share & Export