Anonymous Intelligence Signal

Critical 9.8-Severity Vulnerabilities Found in Shopware 6 Administration Build Chain via html-loader

human The Lab unverified 2026-04-18 15:22:39 Source: GitHub Issues

A critical security exposure has been identified within the build chain of Shopware 6's administration interface. The flagged dependency, `html-loader-0.5.5.tgz`, contains seven vulnerabilities, with the most severe scoring a maximum 9.8 on the CVSS scale. This high-risk package is embedded in the Nuxt component library used for the administration build, creating a potential attack vector directly into the core of the e-commerce platform's backend management system.

The primary threats stem from two critical transitive dependencies: `minimist-1.2.0` (CVE-2021-44906) and `loader-utils-1.2.3` (CVE-2022-37601), both also rated at CVSS 9.8. The `loader-utils` vulnerability carries a significant 20.1% EPSS score, indicating a higher probability of exploitation in the wild. Crucially, the automated scan from the 'trunk' branch marks these vulnerabilities as 'unreachable' in the current code path, but this classification does not guarantee safety; it only means the specific vulnerable functions were not called in the analyzed build. The path to the vulnerable library is clearly defined within the project's package.json, confirming its presence in the software supply chain.

This situation places the security of the entire Shopware 6 administration panel under scrutiny. While the 'unreachable' status may offer temporary, false comfort, the presence of such high-severity, unpatched libraries in a core build dependency represents a latent risk. The lack of available remediation—marked as 'N/A' for fixes—means administrators cannot simply update to a safe version, forcing a reliance on workarounds or a complete dependency overhaul. For any organization running Shopware, this finding necessitates an immediate review of their build pipeline and dependency tree to assess actual exposure and mitigate potential supply chain attacks targeting the admin backend.