CVE-2026-40887

CRITICAL NUCLEI

@vendure/core has a SQL Injection vulnerability

Title source: cna

Description

Vendure is an open-source headless commerce platform. Starting in version 1.7.4 and prior to versions 2.3.4, 3.5.7, and 3.6.2, an unauthenticated SQL injection vulnerability exists in the Vendure Shop API. A user-controlled query string parameter is interpolated directly into a raw SQL expression without parameterization or validation, allowing an attacker to execute arbitrary SQL against the database. This affects all supported database backends (PostgreSQL, MySQL/MariaDB, SQLite). The Admin API is also affected, though exploitation there requires authentication. Versions 2.3.4, 3.5.7, and 3.6.2 contain a patch. For those who are unable to upgrade immediately, Vendure has made a hotfix available that uses `RequestContextService.getLanguageCode` to validate the `languageCode` input at the boundary. This blocks injection payloads before they can reach any query. The hotfix replaces the existing `getLanguageCode` method in `packages/core/src/service/helpers/request-context/request-context.service.ts`. Invalid values are silently dropped and the channel's default language is used instead. The patched versions additionally convert the vulnerable SQL interpolation to a parameterized query as defense in depth.

Nuclei Templates (1)

Vendure Core - SQL Injection
CRITICALVERIFIEDby theamanrawat
Shodan: http.header:"vendure-auth-token"
FOFA: header="vendure-auth-token"

Scores

CVSS v3 9.1
EPSS 0.0456
EPSS Percentile 89.2%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H

Details

CWE
CWE-89
Status published
Products (3)
vendurehq/vendure >= 1.7.4, < 2.3.4
vendurehq/vendure >= 3.0.0, < 3.5.7
vendurehq/vendure >= 3.6.0, < 3.6.2
Published Apr 21, 2026
Tracked Since Apr 22, 2026