Skip to content
CVSS 7.3 · HIGH

CVE-2026-7630

A vulnerability has been found in innocommerce InnoShop up to 0.7.8. The affected element is the function InstallServiceProvider::boot of the file innopacks/install/src/InstallServiceProvider.php of the component Installation Endpoint. The manipulation leads to improper authentication. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used. The identifier of the patch is 45758e4ec22451ab944ae2ae826b1e70f6450dc9. It is recommended to apply a patch to fix this issue.

Ver en NVD

Análisis

This vulnerability affects InnoShop, a niche e-commerce package, allowing remote attackers to bypass authentication through the installation service provider. While the exploit is public and the severity is high, the software's limited adoption in the broader developer community does not justify an alert for community admins.

Severidad

Puntaje: 7.3(HIGH)
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
AV: NETWORK
AC: LOW
PR: NONE
UI: NONE
S: UNCHANGED
C: LOW
I: LOW
A: LOW
Tipo de falla (CWE): CWE-287

EPSS

Probabilidad de explotación (próx. 30 días): 0.0010 (0.1%)
Percentil: 26.5%
EPSS: 2026-05-06

Descripción técnica

A vulnerability has been found in innocommerce InnoShop up to 0.7.8. The affected element is the function InstallServiceProvider::boot of the file innopacks/install/src/InstallServiceProvider.php of the component Installation Endpoint. The manipulation leads to improper authentication. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used. The identifier of the patch is 45758e4ec22451ab944ae2ae826b1e70f6450dc9. It is recommended to apply a patch to fix this issue.

Publicada: 2/5/2026, 14:16:18
Última modificación: 5/5/2026, 19:15:06

Referencias

InicioEventosBlogRecursosEquipo