CVE-2026-23959

4.9 MEDIUM

📋 TL;DR

An error-based SQL injection vulnerability in CoreShop's admin panel allows attackers to extract database information through crafted requests. This affects CoreShop eCommerce solutions running versions before 4.1.9. Attackers with admin panel access can exploit this to read sensitive data from the database.

💻 Affected Systems

Products:
  • CoreShop eCommerce solution
Versions: All versions prior to 4.1.9
Operating Systems: All platforms running CoreShop
Default Config Vulnerable: ⚠️ Yes
Notes: Requires access to the admin panel endpoint. The vulnerability is in the CustomerTransformerController component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full database compromise including customer PII, payment information, admin credentials, and potential privilege escalation to execute arbitrary SQL commands.

🟠

Likely Case

Extraction of sensitive data like customer information, order details, and configuration data through error-based SQL injection techniques.

🟢

If Mitigated

Limited information disclosure through error messages without full data extraction capabilities.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires admin panel access. The vulnerability is error-based SQL injection which is well-understood and relatively easy to exploit with appropriate access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.1.9

Vendor Advisory: https://github.com/coreshop/CoreShop/security/advisories/GHSA-fqcv-8859-86x2

Restart Required: No

Instructions:

1. Backup your CoreShop installation and database. 2. Update CoreShop to version 4.1.9 or later via composer: 'composer require coreshop/core-shop:^4.1.9'. 3. Clear cache if applicable. 4. Verify the update completed successfully.

🔧 Temporary Workarounds

Restrict Admin Panel Access

all

Limit access to the CoreShop admin panel to trusted IP addresses only

Configure web server (Apache/Nginx) to restrict access to /admin paths to specific IP ranges

WAF Rule Implementation

all

Deploy web application firewall rules to detect and block SQL injection attempts

Add SQL injection detection rules to your WAF configuration

🧯 If You Can't Patch

  • Implement strict input validation and parameterized queries for all user inputs in the CustomerTransformerController
  • Enable database query logging and monitor for suspicious SQL patterns

🔍 How to Verify

Check if Vulnerable:

Check if your CoreShop version is below 4.1.9 by examining the composer.json file or running 'composer show coreshop/core-shop'

Check Version:

composer show coreshop/core-shop | grep versions

Verify Fix Applied:

Confirm version is 4.1.9 or higher and test the affected endpoint with safe test inputs

📡 Detection & Monitoring

Log Indicators:

  • Unusual database error messages in application logs
  • Multiple failed SQL queries from single admin sessions
  • Suspicious parameter patterns in admin panel requests

Network Indicators:

  • Unusual SQL syntax in HTTP POST parameters to admin endpoints
  • Repeated requests to CustomerTransformerController with varying parameters

SIEM Query:

source="application.logs" AND ("SQL error" OR "database error") AND uri_path="/admin/*" AND (parameter="*sql*" OR parameter="*union*" OR parameter="*select*")

🔗 References

📤 Share & Export