{"id":"CVE-2026-25757","summary":"Unauthenticated Spree Commerce users can view completed guest orders by Order ID","details":"Spree is an open source e-commerce solution built with Ruby on Rails. Prior to versions 5.0.8, 5.1.10, 5.2.7, and 5.3.2, unauthenticated users can view completed guest orders by Order ID. This issue may lead to disclosure of PII of guest users (including names, addresses and phone numbers). This issue has been patched in versions 5.0.8, 5.1.10, 5.2.7, and 5.3.2.","aliases":["GHSA-p6pv-q7rc-g4h9"],"modified":"2026-04-10T05:40:45.637989Z","published":"2026-02-06T22:37:07.542Z","database_specific":{"cwe_ids":["CWE-639"],"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/25xxx/CVE-2026-25757.json","cna_assigner":"GitHub_M"},"references":[{"type":"WEB","url":"https://github.com/spree/spree/blob/1341623f2ae92685cdbe232885bf5808fc8f9ca8/storefront/app/controllers/spree/orders_controller.rb#L14"},{"type":"WEB","url":"https://github.com/spree/spree/blob/1341623f2ae92685cdbe232885bf5808fc8f9ca8/storefront/app/controllers/spree/orders_controller.rb#L51C1-L55C8"},{"type":"WEB","url":"https://github.com/spree/spree/blob/a878eb4a782ce0445d218ea86fb12075b0e3d7cc/core/lib/spree/core/number_generator.rb#L45"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/25xxx/CVE-2026-25757.json"},{"type":"ADVISORY","url":"https://github.com/spree/spree/security/advisories/GHSA-p6pv-q7rc-g4h9"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-25757"},{"type":"FIX","url":"https://github.com/spree/spree/commit/3e00be64c128ef4bd4b99731f0c3ab469509cfab"},{"type":"FIX","url":"https://github.com/spree/spree/commit/6b32ed7d474aa55fa441990e6aa39740152aa1be"},{"type":"FIX","url":"https://github.com/spree/spree/commit/6f6b8a7a28a8bff24a6e20eab04b4bbbdf39384d"},{"type":"FIX","url":"https://github.com/spree/spree/commit/ea4a5db590ca753dbc986f2a4e818d9e0edfb1ad"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/spree/spree","events":[{"introduced":"0"},{"fixed":"7af62b211e1750d272887b258b27c736586abe5e"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"5.0.8"}]}},{"type":"GIT","repo":"https://github.com/spree/spree","events":[{"introduced":"a8d7ad128ce7adabaea7e254803ac836fe88e154"},{"fixed":"df01ae37e70d261babc8675e4882e2ee61067f6b"}],"database_specific":{"versions":[{"introduced":"5.1.0"},{"fixed":"5.1.10"}]}},{"type":"GIT","repo":"https://github.com/spree/spree","events":[{"introduced":"a100d2b1c9b264d1796b2433db002d12dddc32cc"},{"fixed":"9b993497af028b28f5f08e11fcc65676702f4b98"}],"database_specific":{"versions":[{"introduced":"5.2.0"},{"fixed":"5.2.7"}]}},{"type":"GIT","repo":"https://github.com/spree/spree","events":[{"introduced":"598f2be5f586d4b802874ec71bfd8ffe46851a4b"},{"fixed":"506a52f48f767b75bc2e5465f99b2c138074520b"}],"database_specific":{"versions":[{"introduced":"5.3.0"},{"fixed":"5.3.2"}]}}],"versions":["v0.11.0","v0.11.99","v0.2.0","v0.30.0.beta1","v0.4.0","v0.40.0","v0.70.0.rc2","v0.8.2","v1.0.0.rc1","v1.0.0.rc2","v1.0.0.rc3","v1.2.0.rc1","v2.4.0.rc1","v2.4.0.rc2","v3.0.0.rc1","v3.1.0.rc1","v3.2.0.rc1","v3.2.2","v3.3.0","v3.3.0.rc1","v3.3.0.rc2","v3.3.0.rc3","v3.3.0.rc4","v3.4.0","v3.4.0.rc1","v3.4.0.rc2","v3.5.0.rc1","v3.6.0.rc1","v3.7.0.beta","v3.7.0.rc1","v4.0.0.beta","v4.1.0","v4.1.0.rc1","v4.1.0.rc2","v4.1.0.rc3","v4.10.0","v4.10.1","v4.2.0","v4.2.0.beta","v4.2.0.rc1","v4.2.0.rc2","v4.2.0.rc3","v4.2.0.rc4","v4.2.0.rc5","v4.3.0","v4.3.0.rc1","v4.3.0.rc2","v4.3.0.rc3","v4.4.0.rc1","v4.5.0","v4.6.0","v4.7.0","v4.8.0","v4.8.1","v4.8.2","v4.8.3","v4.9.0","v5.0.0","v5.0.1","v5.0.2","v5.0.3","v5.0.4","v5.0.5","v5.0.6","v5.0.7","v5.1.0","v5.1.1","v5.1.2","v5.1.3","v5.1.4","v5.1.5","v5.1.6","v5.1.7","v5.1.8","v5.1.9","v5.2.0","v5.2.1","v5.2.2","v5.2.3","v5.2.4","v5.2.5","v5.2.6","v5.3.0","v5.3.1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-25757.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V4","score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:P"}]}