Loading HuntDB...

GHSA-93cw-f5jj-x85w

GitHub Security Advisory

Shopware vulnerable to Improper Control of Generation of Code in Twig rendered views

✓ GitHub Reviewed CRITICAL Has CVE

Advisory Details

### Impact
In Twig environment **without the Sandbox extension**, it is possible to refer to PHP functions in twig filters like `map`, `filter`, `sort`. This allows in the template to call any global PHP function.

### Patches
The problem has been fixed with 6.4.18.1 with an override of the specified filters until the integration of the Sandbox extension has been finished.

### Workarounds
For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.

### References

https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-01-2023?category=security-updates

Affected Packages

Packagist shopware/platform
Affected versions: 0 (fixed in 6.4.18.1)
Packagist shopware/core
Affected versions: 0 (fixed in 6.4.18.1)

Related CVEs

Key Information

GHSA ID
GHSA-93cw-f5jj-x85w
Published
January 17, 2023 11:58 PM
Last Modified
January 25, 2023 6:04 PM
CVSS Score
9.0 /10
Primary Ecosystem
Packagist
Primary Package
shopware/platform
GitHub Reviewed
✓ Yes

Dataset

Last updated: November 25, 2025 6:29 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.