CVE-2026-7630
A vulnerability has been found in innocommerce InnoShop up to 0.7.8. The affected element is the function InstallServiceProvider::boot of the file innopacks/install/src/InstallServiceProvider.php of the component Installation Endpoint. The manipulation leads to improper authentication. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used. The identifier of the patch is 45758e4ec22451ab944ae2ae826b1e70f6450dc9. It is recommended to apply a patch to fix this issue.
Ver en NVDAnálisis
This vulnerability affects InnoShop, a niche e-commerce package, allowing remote attackers to bypass authentication through the installation service provider. While the exploit is public and the severity is high, the software's limited adoption in the broader developer community does not justify an alert for community admins.
Severidad
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:LCWE-287EPSS
Descripción técnica
A vulnerability has been found in innocommerce InnoShop up to 0.7.8. The affected element is the function InstallServiceProvider::boot of the file innopacks/install/src/InstallServiceProvider.php of the component Installation Endpoint. The manipulation leads to improper authentication. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used. The identifier of the patch is 45758e4ec22451ab944ae2ae826b1e70f6450dc9. It is recommended to apply a patch to fix this issue.
Referencias
- https://github.com/innocommerce/innoshop/
- https://github.com/innocommerce/innoshop/commit/45758e4ec22451ab944ae2ae826b1e70f6450dc9
- https://github.com/innocommerce/innoshop/issues/314
- https://github.com/innocommerce/innoshop/issues/314#issuecomment-4357464458
- https://vuldb.com/submit/806484
- https://vuldb.com/vuln/360576
- https://vuldb.com/vuln/360576/cti