The perpetrator could query the API v2 Order Status endpoint with an empty string passed as an Order token
Please upgrade to 3.7.11, 4.0.4, or 4.1.11 depending on your used Spree version. Users of Spree < 3.7 are not affected.
Pull request with a fix and in-depth explanation - https://github.com/spree/spree/pull/10573
If you have any questions or comments about this advisory:
github.com/rubysec/ruby-advisory-db/blob/master/gems/spree_api/CVE-2020-26223.yml
github.com/spree/spree
github.com/spree/spree/pull/10573
github.com/spree/spree/security/advisories/GHSA-m2jr-hmc3-qmpr
guides.spreecommerce.org/api/v2/storefront#tag/Order-Status
nvd.nist.gov/vuln/detail/CVE-2020-26223
rubygems.org/gems/spree_api/versions