Insufficient Session Expiration Affecting shopware/core package, versions >=6.3.5.0, <6.5.8.8>=6.6.0.0, <6.6.1.0


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.05% (18th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Insufficient Session Expiration vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PHP-SHOPWARECORE-6592762
  • published9 Apr 2024
  • disclosed8 Apr 2024
  • creditmdanilowicz

Introduced: 8 Apr 2024

CVE-2024-31447  (opens in a new tab)
CWE-613  (opens in a new tab)

How to fix?

Upgrade shopware/core to version 6.5.8.8, 6.6.1.0 or higher.

Overview

shopware/core is a Shopware platform is the core for all Shopware ecommerce products.

Affected versions of this package are vulnerable to Insufficient Session Expiration due to the handling of authenticated requests to POST /store-api/account/logout, where the cart is cleared but the user session remains active. This issue is specific to direct store-api usage, as the PHP Storefront component properly listens to CustomerLogoutEvent and invalidates the session.

Workaround

When not able to update, the latest version of the Shopware Security Plugin can be installed instead.

CVSS Scores

version 3.1