CVE-2026-40887
Vendure · Vendure
An unauthenticated SQL injection vulnerability in the Vendure Shop API allows remote attackers to execute arbitrary SQL commands against the backend database.
Executive summary
An unauthenticated SQL injection vulnerability in the Vendure Shop API permits remote attackers to execute arbitrary database queries, leading to potential unauthorized data access or modification.
Vulnerability
Input validation failure in the Shop API allows unauthenticated users to inject malicious SQL into query string parameters, which are processed without sufficient sanitization.
Business impact
This vulnerability carries a CVSS score of 9.1, indicating a critical risk to business operations. Exploitation could result in the exfiltration of sensitive customer data, unauthorized administrative access, or complete database corruption, causing significant reputational and operational harm.
Remediation
Immediate Action: Upgrade to versions 2.3.4, 3.5.7, or 3.6.2 depending on your current deployment branch.
Proactive Monitoring: Review database query logs for syntax errors, unexpected union selects, or signs of reconnaissance activity targeting the Vendure Shop API.
Compensating Controls: Apply the provided vendor hotfix to the RequestContextService to validate languageCode inputs, or implement a WAF rule to block suspicious SQL injection patterns in query strings.
Exploitation status
Public Exploit Available: No
Analyst recommendation
Given the ease of exploitation and the potential for total database compromise, organizations must apply the provided patches or hotfixes immediately. Ensure all database backends (PostgreSQL, MySQL, SQLite) are protected by the updated validation logic.