<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Framework — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/framework/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 18 May 2026 16:35:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/framework/feed.xml" rel="self" type="application/rss+xml"/><item><title>Shopper Framework Authorization Bypass in Multiple Livewire Admin Components</title><link>https://feed.craftedsignal.io/briefs/2026-05-shopper-framework-auth-bypass/</link><pubDate>Mon, 18 May 2026 16:35:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-shopper-framework-auth-bypass/</guid><description>Multiple Livewire components in the Shopper framework admin panel allowed authenticated low-privilege users to bypass authorization and mutate data without the required permissions, leading to potential privilege escalation and cross-site scripting.</description><content:encoded><![CDATA[<p>The Shopper framework, a Laravel e-commerce platform, was found to have multiple authorization bypass vulnerabilities within its Livewire admin components. An authenticated user with low privileges could exploit these flaws to modify order details, shipment information, product data, user roles, and payment configurations without the necessary permissions. Several public Eloquent model properties on Livewire components were also vulnerable to client-side ID tampering due to missing <code>#[Locked]</code> attributes. Additionally, a stored XSS vulnerability existed in the product barcode field. These vulnerabilities were addressed in version 2.8.0, released in May 2026. Exploitation of these vulnerabilities could lead to privilege escalation, data manipulation, and potential compromise of sensitive information within the e-commerce platform.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the Shopper framework admin panel with a low-privilege user account.</li>
<li>The attacker navigates to an order detail page, such as the &ldquo;Order Detail&rdquo; Filament actions.</li>
<li>The attacker exploits the missing authorization check to call actions like <code>cancel</code>, <code>mark paid</code>, or <code>capture payment</code> without <code>edit_orders</code> permission. The <code>capturePayment</code> action could trigger a payment service provider (PSP) capture.</li>
<li>Alternatively, the attacker accesses the <code>Settings/Team/Index</code> page, where user roles can be managed.</li>
<li>Due to the absence of <code>mount()</code> authorization, the attacker can create new roles or delete other users, potentially elevating their own privileges.</li>
<li>The attacker exploits the stored XSS vulnerability in the product barcode field by injecting malicious JavaScript code.</li>
<li>When other administrators or users view the product details, the XSS payload is executed via <code>DNS1DFacade::getBarcodeHTML()</code> with <code>{!! !!}</code>, potentially leading to session hijacking or other malicious actions.</li>
<li>The attacker can further exploit the lack of #[Locked] attributes to perform client-side ID tampering.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities could allow an attacker to escalate privileges, modify orders and products, manipulate user roles, and inject malicious JavaScript code into the Shopper framework. This could lead to data breaches, financial losses, and compromise of sensitive customer information. The vulnerabilities impact any Shopper framework instance running a version prior to 2.8.0. If successful, an attacker could gain full control over the e-commerce platform, potentially affecting thousands of customers and businesses relying on the compromised system.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade to Shopper framework version 2.8.0 or later to patch the authorization bypass and XSS vulnerabilities (Affected Packages).</li>
<li>Deploy the Sigma rule &ldquo;Detect Shopper Framework Settings Team Index Access Without Authentication&rdquo; to detect unauthorized access attempts to the <code>Settings/Team/Index</code> page (Sigma rule).</li>
<li>Deploy the Sigma rule &ldquo;Detect Shopper Framework Product Barcode Stored XSS Attempt&rdquo; to identify potential stored XSS attempts via the barcode field (Sigma rule).</li>
<li>Review and enforce strict role-based access controls (RBAC) throughout the application to prevent unauthorized data modification.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>authorization-bypass</category><category>privilege-escalation</category><category>xss</category><category>web-application</category></item></channel></rss>