Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-2mwc-h2mg-v6p8 | Bagisto has HTML Filter Bypass that Enables Stored XSS |
Thu, 08 Jan 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:webkul:bagisto:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Mon, 05 Jan 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Webkul
Webkul bagisto |
|
| Vendors & Products |
Webkul
Webkul bagisto |
Fri, 02 Jan 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 02 Jan 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Bagisto is an open source laravel eCommerce platform. A stored Cross-Site Scripting (XSS) vulnerability exists in Bagisto prior to version 2.3.10 within the CMS page editor. Although the platform normally attempts to sanitize `<script>` tags, the filtering can be bypassed by manipulating the raw HTTP POST request before submission. As a result, arbitrary JavaScript can be stored in the CMS content and executed whenever the page is viewed or edited. This exposes administrators to a high-severity risk, including complete account takeover, backend hijacking, and malicious script execution. Version 2.3.10 fixes the issue. | |
| Title | Bagisto has HTML Filter Bypass that Enables Stored XSS | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-01-02T21:25:51.523Z
Reserved: 2025-12-29T03:00:29.277Z
Link: CVE-2026-21451
Updated: 2026-01-02T21:25:47.080Z
Status : Analyzed
Published: 2026-01-02T21:16:02.930
Modified: 2026-01-08T21:20:06.553
Link: CVE-2026-21451
No data.
OpenCVE Enrichment
Updated: 2026-04-18T08:30:35Z
Github GHSA