Bagisto is an open source laravel eCommerce platform. Versions prior to 2.3.10 are vulnerable to server-side template injection. When a normal customer orders any product, in the `add address` step they can inject a value to run in admin view. The issue can lead to remote code execution. Version 2.3.10 contains a patch.
References
| Link | Resource |
|---|---|
| https://github.com/bagisto/bagisto/security/advisories/GHSA-5j4h-4f72-qpm6 | Exploit Vendor Advisory |
Configurations
History
08 Jan 2026, 21:22
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:webkul:bagisto:*:*:*:*:*:*:*:* | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
| First Time |
Webkul bagisto
Webkul |
|
| References | () https://github.com/bagisto/bagisto/security/advisories/GHSA-5j4h-4f72-qpm6 - Exploit, Vendor Advisory |
02 Jan 2026, 21:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-02 21:15
Updated : 2026-01-08 21:22
NVD link : CVE-2026-21448
Mitre link : CVE-2026-21448
CVE.ORG link : CVE-2026-21448
JSON object : View
Products Affected
webkul
- bagisto
CWE
CWE-1336
Improper Neutralization of Special Elements Used in a Template Engine
