Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 14 May 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Cubecart
Cubecart cubecart |
|
| Vendors & Products |
Cubecart
Cubecart cubecart |
Thu, 14 May 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 13 May 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | CubeCart is an ecommerce software solution. Prior to 6.6.0, Authenticated Time-Based Blind SQL Injection vulnerabilities were identified in the sorting parameters (sort[price], sort_activity, sort_admin, and sort_customer) of the Products and Logs endpoints in CubeCart v6.x. This allows an attacker to execute arbitrary SQL commands, compromising the confidentiality and integrity of the database. This vulnerability is fixed in 6.6.0. | |
| Title | CubeCart: Time-based Blind SQL Injection | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-14T12:54:15.141Z
Reserved: 2026-04-06T21:29:17.349Z
Link: CVE-2026-39358
Updated: 2026-05-14T12:54:05.315Z
Status : Deferred
Published: 2026-05-13T21:16:46.657
Modified: 2026-05-14T16:49:18.583
Link: CVE-2026-39358
No data.
OpenCVE Enrichment
Updated: 2026-05-14T14:33:26Z