Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

shopware

About This Vendor

shopware is a technology vendor producing software and infrastructure products. As a software provider, shopware's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of shopware's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 65 known vulnerabilities from shopware. This includes 4 critical-severity issues and 22 high-severity issues that represent significant risk. These vulnerabilities affect 3 distinct products across shopware's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 2017 through 2026, reflecting sustained security scrutiny over multiple years. Organizations deploying shopware products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2016-3109 2017-04-21 2025-04-20 9.8 10.0 Likely
CVE-2017-15374 2017-10-16 2025-04-20 6.1 4.3 Likely
CVE-2017-18357 2019-01-15 2024-11-21 6.5 4.0 Likely
CVE-2018-20713 2019-01-15 2024-11-21 8.8 6.5 Likely
CVE-2019-12799 2019-06-13 2024-11-21 8.8 6.5 Likely
CVE-2019-12935 2019-06-23 2024-11-21 7.4 4.3 Likely
CVE-2020-13970 2020-07-28 2024-11-21 8.8 6.5 Likely
CVE-2020-13971 2020-07-28 2024-11-21 5.4 3.5 Unknown
CVE-2020-13997 2020-07-28 2024-11-21 7.5 5.0 Likely
CVE-2021-32709 2021-06-24 2024-11-21 4.9 4.0 Likely
CVE-2021-32710 2021-06-24 2024-11-21 5.9 5.0 Likely
CVE-2021-32711 2021-06-24 2024-11-21 9.1 5.0 Likely
CVE-2021-32712 2021-06-24 2024-11-21 5.3 5.0 Likely
CVE-2021-32713 2021-06-24 2024-11-21 4.8 3.5 Unknown
CVE-2021-32716 2021-06-24 2024-11-21 4.4 4.0 Likely
CVE-2021-32717 2021-06-24 2024-11-21 7.5 5.0 Likely
CVE-2021-37707 2021-08-16 2024-11-21 6.5 5.0 Likely
CVE-2021-37708 2021-08-16 2024-11-21 8.8 7.5 Likely
CVE-2021-37709 2021-08-16 2024-11-21 6.5 4.0 Likely
CVE-2021-37710 2021-08-16 2024-11-21 8.0 3.5 Unknown
CVE-2021-37711 2021-08-16 2024-11-21 8.8 6.5 Likely
CVE-2021-41188 2021-10-26 2024-11-21 5.7 3.5 Unknown
CVE-2022-21651 2022-01-05 2024-11-21 6.8 5.8 Likely
CVE-2022-21652 2022-01-05 2024-11-21 3.5 5.5 Likely
CVE-2022-24744 2022-03-09 2024-11-21 2.6 3.5 Unknown
CVE-2022-24745 2022-03-09 2024-11-21 4.8 5.8 Likely
CVE-2022-24746 2022-03-09 2024-11-21 6.1 4.3 Likely
CVE-2022-24747 2022-03-09 2024-11-21 6.3 5.0 Likely
CVE-2022-24748 2022-03-09 2024-11-21 6.8 5.0 Likely
CVE-2022-24956 2022-03-29 2024-11-21 6.5 4.0 Likely
CVE-2022-24871 2022-04-20 2024-11-21 7.2 5.5 Likely
CVE-2022-24872 2022-04-20 2024-11-21 8.1 5.5 Likely
CVE-2022-24873 2022-04-28 2024-11-21 5.4 4.3 Likely
CVE-2022-24879 2022-04-28 2024-11-21 7.5 5.0 Likely
CVE-2022-24892 2022-04-28 2024-11-21 6.4 6.8 Likely
CVE-2022-31057 2022-06-27 2024-11-21 6.5 3.5 Unknown
CVE-2022-31148 2022-08-01 2024-11-21 5.4 - -
CVE-2022-36101 2022-09-12 2024-11-21 5.4 - -
CVE-2022-36102 2022-09-12 2024-11-21 6.3 - -
CVE-2023-22730 2023-01-17 2024-11-21 5.3 - -
CVE-2023-22731 2023-01-17 2024-11-21 9.9 - -
CVE-2023-22732 2023-01-17 2024-11-21 3.7 - -
CVE-2023-22733 2023-01-17 2024-11-21 2.7 - -
CVE-2023-22734 2023-01-17 2024-11-21 4.3 - -
CVE-2023-23941 2023-02-03 2024-11-21 7.5 - -
CVE-2023-2017 2023-04-17 2024-11-21 8.8 - -
CVE-2022-48150 2023-04-21 2025-02-05 6.1 - -
CVE-2023-34098 2023-06-27 2024-11-21 5.3 - -
CVE-2023-34099 2023-06-27 2024-11-21 5.3 - -
CVE-2024-22406 2024-01-16 2024-11-21 9.3 - -
CVE-2024-22407 2024-01-16 2024-11-21 4.9 - -
CVE-2024-22408 2024-01-16 2024-11-21 7.6 - -
CVE-2024-27917 2024-03-06 2025-09-10 7.5 - -
CVE-2024-31447 2024-04-08 2025-09-10 5.3 - -
CVE-2024-42354 2024-08-08 2024-08-12 5.3 - -
CVE-2024-42355 2024-08-08 2024-08-12 8.3 - -
CVE-2024-42356 2024-08-08 2024-08-12 8.3 - -
CVE-2024-42357 2024-08-08 2024-08-12 7.3 - -
CVE-2025-30150 2025-04-08 2025-09-10 5.3 - -
CVE-2025-30151 2025-04-08 2025-09-10 7.5 - -
CVE-2025-32378 2025-04-09 2025-09-10 5.3 - -
CVE-2025-27892 2025-04-15 2025-04-23 6.8 - -
CVE-2025-51541 2025-08-05 2025-09-10 6.1 - -
CVE-2025-7954 2025-08-06 2025-11-03 8.1 - -
CVE-2026-23498 2026-01-14 2026-01-28 7.2 - -

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for shopware by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with shopware's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.