Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 14 May 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Cubecart
Cubecart cubecart |
|
| Vendors & Products |
Cubecart
Cubecart cubecart |
Thu, 14 May 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 13 May 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | CubeCart is an ecommerce software solution. Prior to 6.7.2, CubeCart 6.6.x – 6.7.1 builds CC_STORE_URL directly from the Host request header at bootstrap, with no allowlist. The constant is embedded verbatim into transactional email links, most critically the password-reset link in User::passwordRequest() (and the admin equivalent in Admin::passwordRequest()). An unauthenticated attacker who knows a target email can POST /index.php?_a=recover with Host: evil.com; CubeCart writes a fresh verify token (valid 3,600 s) and emails the victim a link http://evil.com/index.php?_a=recovery&validate=<TOKEN>. The token is valid against the legitimate store — capturing the victim's click on evil.com yields full account takeover, or store takeover when an admin email is targeted. This vulnerability is fixed in 6.7.2. | |
| Title | CubeCart: Pre-Authenticated Password Reset Link Poisoning via HTTP Host Header | |
| Weaknesses | CWE-20 CWE-345 CWE-601 CWE-784 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-14T12:53:08.617Z
Reserved: 2026-05-08T18:07:27.342Z
Link: CVE-2026-45055
Updated: 2026-05-14T12:52:58.952Z
Status : Deferred
Published: 2026-05-13T21:16:49.437
Modified: 2026-05-14T16:49:18.583
Link: CVE-2026-45055
No data.
OpenCVE Enrichment
Updated: 2026-05-14T14:33:18Z