Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-5j4h-4f72-qpm6 | Bagisto has Normal & Blind SSTI from low-privilege user when ordering product |
Thu, 08 Jan 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:webkul:bagisto:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Mon, 05 Jan 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Webkul
Webkul bagisto |
|
| Vendors & Products |
Webkul
Webkul bagisto |
Fri, 02 Jan 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 02 Jan 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Bagisto is an open source laravel eCommerce platform. Versions prior to 2.3.10 are vulnerable to server-side template injection. When a normal customer orders any product, in the `add address` step they can inject a value to run in admin view. The issue can lead to remote code execution. Version 2.3.10 contains a patch. | |
| Title | Bagisto has Normal & Blind SSTI from low-privilege user when ordering product | |
| Weaknesses | CWE-1336 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-01-02T21:29:34.047Z
Reserved: 2025-12-29T03:00:29.277Z
Link: CVE-2026-21448
Updated: 2026-01-02T21:29:30.264Z
Status : Analyzed
Published: 2026-01-02T21:15:59.053
Modified: 2026-01-08T21:22:34.810
Link: CVE-2026-21448
No data.
OpenCVE Enrichment
Updated: 2026-04-18T19:30:08Z
Github GHSA