Jan 2, 2026·5 min read·13 visits
Bagisto left the installer routes active after installation but tried to hide them with a redirect. The catch? The redirect only applied to standard browser requests. By adding a simple `X-Requested-With: XMLHttpRequest` header, attackers can bypass the check, access the installer API, and overwrite the primary administrator account.
A logic flaw in Bagisto's installer middleware allows unauthenticated attackers to re-run the installation process via AJAX requests, enabling complete administrative takeover.
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H| Product | Affected Versions | Fixed Version |
|---|---|---|
Bagisto Webkul | >= 2.3.0, < 2.3.10 | 2.3.10 |
| Attribute | Detail |
|---|---|
| CWE ID | CWE-306 |
| CVSS Score | 9.8 (Critical) |
| Attack Vector | Network (Remote) |
| Authentication | None |
| Impact | Account Takeover / RCE |
| Exploit Status | PoC Available |
The software does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.