FroshAdminer Adminer UI is accessible without admin session
Moderate severity
GitHub Reviewed
Published
Feb 7, 2026
in
FriendsOfShopware/FroshPlatformAdminer
•
Updated Feb 10, 2026
Description
Published by the National Vulnerability Database
Feb 9, 2026
Published to the GitHub Advisory Database
Feb 10, 2026
Reviewed
Feb 10, 2026
Last updated
Feb 10, 2026
Summary
Unauthenticated access to Adminer UI
Details
The Adminer route (/admin/adminer) was accessible without Shopware admin authentication. The route was configured with auth_required=false and performed no session validation, exposing the Adminer UI to unauthenticated users.
Note: Database access itself requires credentials that are only set through the ACL-protected API endpoint. Direct database access without prior admin login is not possible through this vulnerability alone.
Impact
An unauthenticated user could access the Adminer interface, potentially disclosing version information or exploiting Adminer-specific vulnerabilities.
Patches
Version 2.2.1 adds session validation. The Adminer route now verifies an authenticated session flag before rendering — returning HTTP 403 otherwise.
Workarounds
Deactivate or uninstall the plugin.
References