CVE-2026-25757

Spree is an open source e-commerce solution built with Ruby on Rails. Prior to versions 5.0.8, 5.1.10, 5.2.7, and 5.3.2, unauthenticated users can view completed guest orders by Order ID. This issue may lead to disclosure of PII of guest users (including names, addresses and phone numbers). This issue has been patched in versions 5.0.8, 5.1.10, 5.2.7, and 5.3.2.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:spreecommerce:spree:*:*:*:*:*:*:*:*
cpe:2.3:a:spreecommerce:spree:*:*:*:*:*:*:*:*
cpe:2.3:a:spreecommerce:spree:*:*:*:*:*:*:*:*
cpe:2.3:a:spreecommerce:spree:*:*:*:*:*:*:*:*

History

23 Feb 2026, 17:40

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.3
References () https://github.com/spree/spree/blob/1341623f2ae92685cdbe232885bf5808fc8f9ca8/storefront/app/controllers/spree/orders_controller.rb#L14 - () https://github.com/spree/spree/blob/1341623f2ae92685cdbe232885bf5808fc8f9ca8/storefront/app/controllers/spree/orders_controller.rb#L14 - Patch
References () https://github.com/spree/spree/blob/1341623f2ae92685cdbe232885bf5808fc8f9ca8/storefront/app/controllers/spree/orders_controller.rb#L51C1-L55C8 - () https://github.com/spree/spree/blob/1341623f2ae92685cdbe232885bf5808fc8f9ca8/storefront/app/controllers/spree/orders_controller.rb#L51C1-L55C8 - Patch
References () https://github.com/spree/spree/blob/a878eb4a782ce0445d218ea86fb12075b0e3d7cc/core/lib/spree/core/number_generator.rb#L45 - () https://github.com/spree/spree/blob/a878eb4a782ce0445d218ea86fb12075b0e3d7cc/core/lib/spree/core/number_generator.rb#L45 - Patch
References () https://github.com/spree/spree/commit/3e00be64c128ef4bd4b99731f0c3ab469509cfab - () https://github.com/spree/spree/commit/3e00be64c128ef4bd4b99731f0c3ab469509cfab - Patch
References () https://github.com/spree/spree/commit/6b32ed7d474aa55fa441990e6aa39740152aa1be - () https://github.com/spree/spree/commit/6b32ed7d474aa55fa441990e6aa39740152aa1be - Patch
References () https://github.com/spree/spree/commit/6f6b8a7a28a8bff24a6e20eab04b4bbbdf39384d - () https://github.com/spree/spree/commit/6f6b8a7a28a8bff24a6e20eab04b4bbbdf39384d - Patch
References () https://github.com/spree/spree/commit/ea4a5db590ca753dbc986f2a4e818d9e0edfb1ad - () https://github.com/spree/spree/commit/ea4a5db590ca753dbc986f2a4e818d9e0edfb1ad - Patch
References () https://github.com/spree/spree/security/advisories/GHSA-p6pv-q7rc-g4h9 - () https://github.com/spree/spree/security/advisories/GHSA-p6pv-q7rc-g4h9 - Exploit, Vendor Advisory
First Time Spreecommerce spree
Spreecommerce
CPE cpe:2.3:a:spreecommerce:spree:*:*:*:*:*:*:*:*

06 Feb 2026, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-06 23:15

Updated : 2026-02-23 17:40


NVD link : CVE-2026-25757

Mitre link : CVE-2026-25757

CVE.ORG link : CVE-2026-25757


JSON object : View

Products Affected

spreecommerce

  • spree
CWE
CWE-639

Authorization Bypass Through User-Controlled Key