Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-9hvg-qw5q-wqwp | Bagisto SSTI vulnerability in type parameter can lead to RCE |
Thu, 08 Jan 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:webkul:bagisto:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Mon, 05 Jan 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Webkul
Webkul bagisto |
|
| Vendors & Products |
Webkul
Webkul bagisto |
Fri, 02 Jan 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 02 Jan 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Bagisto is an open source laravel eCommerce platform. Versions prior to 2.3.10 are vulnerable to server-side template injection via type parameter, which can lead to remote code execution or another exploitation. Version 2.3.10 fixes the issue. | |
| Title | Bagisto has SSTI in parameter that can lead to RCE | |
| Weaknesses | CWE-1336 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-01-02T21:24:43.041Z
Reserved: 2025-12-29T03:00:29.277Z
Link: CVE-2026-21450
Updated: 2026-01-02T21:24:29.721Z
Status : Analyzed
Published: 2026-01-02T21:16:02.797
Modified: 2026-01-08T21:20:38.707
Link: CVE-2026-21450
No data.
OpenCVE Enrichment
Updated: 2026-04-18T08:30:35Z
Github GHSA