Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-mqhg-v22x-pqj8 | Bagisto is vulnerable to SSTI via name parameters provided by non-admin low-privilege users |
Thu, 08 Jan 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:webkul:bagisto:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Mon, 05 Jan 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Webkul
Webkul bagisto |
|
| Vendors & Products |
Webkul
Webkul bagisto |
Fri, 02 Jan 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 02 Jan 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Bagisto is an open source laravel eCommerce platform. Versions prior to 2.3.10 are vulnerable to server-side template injection via first name and last name from a low-privilege user. Version 2.3.10 fixes the issue. | |
| Title | Bagisto has SSTI via first and last name from low-privilege user (not admin) | |
| Weaknesses | CWE-1336 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-01-02T21:27:39.053Z
Reserved: 2025-12-29T03:00:29.277Z
Link: CVE-2026-21449
Updated: 2026-01-02T21:27:30.570Z
Status : Analyzed
Published: 2026-01-02T21:16:02.647
Modified: 2026-01-08T21:21:59.040
Link: CVE-2026-21449
No data.
OpenCVE Enrichment
Updated: 2026-04-18T20:15:09Z
Github GHSA