Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 30 Oct 2025 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:webkul:bagisto:2.3.6:*:*:*:*:*:*:* |
Fri, 10 Oct 2025 11:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Webkul
Webkul bagisto |
|
| Vendors & Products |
Webkul
Webkul bagisto |
Thu, 09 Oct 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-77 | |
| Metrics |
cvssV3_1
|
Thu, 09 Oct 2025 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An issue WebKul Bagisto v.2.3.6 allows a remote attacker to execute arbitrary code via the Cart/Checkout API endpoint, specifically, the price calculation logic fails to validate quantity inputs properly. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-10-09T19:10:53.669Z
Reserved: 2025-08-17T00:00:00.000Z
Link: CVE-2025-56426
Updated: 2025-10-09T19:10:49.798Z
Status : Analyzed
Published: 2025-10-09T16:15:45.480
Modified: 2025-10-30T14:30:40.043
Link: CVE-2025-56426
No data.
OpenCVE Enrichment
Updated: 2025-10-10T11:18:23Z