EC-CUBE provided by EC-CUBE CO.,LTD. contains a multi-factor authentication (MFA) bypass vulnerability. An attacker who has obtained a valid administrator ID and password may be able to bypass two-factor authentication and gain unauthorized access to the administrative page.
References
| Link | Resource |
|---|---|
| https://jvn.jp/en/jp/JVN63765888/ | Third Party Advisory |
| https://www.ec-cube.net/info/weakness/20260209/index.php | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
09 Mar 2026, 18:34
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://jvn.jp/en/jp/JVN63765888/ - Third Party Advisory | |
| References | () https://www.ec-cube.net/info/weakness/20260209/index.php - Patch, Vendor Advisory | |
| First Time |
Ec-cube
Ec-cube ec-cube |
|
| Summary |
|
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
| CPE | cpe:2.3:a:ec-cube:ec-cube:4.2.3:p1:*:*:*:*:*:* cpe:2.3:a:ec-cube:ec-cube:*:-:*:*:*:*:*:* cpe:2.3:a:ec-cube:ec-cube:4.1.2:p3:*:*:*:*:*:* cpe:2.3:a:ec-cube:ec-cube:4.1.2:p1:*:*:*:*:*:* cpe:2.3:a:ec-cube:ec-cube:4.1.2:-:*:*:*:*:*:* cpe:2.3:a:ec-cube:ec-cube:4.1.2:p2:*:*:*:*:*:* cpe:2.3:a:ec-cube:ec-cube:4.3.1:-:*:*:*:*:*:* cpe:2.3:a:ec-cube:ec-cube:4.1.2:p4:*:*:*:*:*:* cpe:2.3:a:ec-cube:ec-cube:4.2.3:-:*:*:*:*:*:* |
05 Mar 2026, 06:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-05 06:16
Updated : 2026-03-09 18:34
NVD link : CVE-2026-30777
Mitre link : CVE-2026-30777
CVE.ORG link : CVE-2026-30777
JSON object : View
Products Affected
ec-cube
- ec-cube
CWE
CWE-288
Authentication Bypass Using an Alternate Path or Channel
