CVEReports
CVEReports

Automated vulnerability intelligence platform. Comprehensive reports for high-severity CVEs generated by AI.

Product

  • Home
  • Sitemap
  • RSS Feed

Company

  • About
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CVEReports. All rights reserved.

Made with love by Amit Schendel & Alon Barad



CVE-2026-21448
9.3

Checkout to Shell: Unpacking the Bagisto Stored SSTI RCE

Alon Barad
Alon Barad
Software Engineer

Jan 2, 2026·7 min read·10 visits

PoC Available

Executive Summary (TL;DR)

Bagisto versions prior to 2.3.10 fail to sanitize user input in the checkout process. An attacker can input a Laravel Blade template payload (e.g., `{{ system('id') }}`) into their shipping address. When an administrator views the order in the backend, the payload executes on the server, granting full RCE.

A critical Stored Server-Side Template Injection (SSTI) vulnerability in the Bagisto eCommerce platform allows unauthenticated attackers to achieve Remote Code Execution (RCE) by injecting malicious payloads into shipping address fields.

Official Patches

BagistoBagisto v2.3.10 Release Notes

Technical Appendix

CVSS Score
9.3/ 10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Affected Systems

Bagisto eCommerce Platform < 2.3.10Laravel applications using vulnerable Bagisto packages

Affected Versions Detail

Product
Affected Versions
Fixed Version
Bagisto
Bagisto
< 2.3.102.3.10
AttributeDetail
CWE IDCWE-1336
Attack VectorNetwork (Remote)
CVSS v3.19.3 (Critical)
ImpactRemote Code Execution (RCE)
Exploit StatusPoC Available
Requires AuthNo (Unauthenticated at injection point)

MITRE ATT&CK Mapping

T1190Exploit Public-Facing Application
Initial Access
T1059.003Command and Scripting Interpreter: Windows Command Shell
Execution
T1059.004Command and Scripting Interpreter: Unix Shell
Execution
CWE-1336
Improper Neutralization of Special Elements Used in a Template Engine

The application saves user-provided information into a template file or uses it in a way that allows the template engine to execute it as code.

Known Exploits & Detection

GitHub Security AdvisoryOriginal advisory detailing the SSTI vector in address fields.

Vulnerability Timeline

CVE Published
2026-01-02
Patch Released (v2.3.10)
2026-01-02

References & Sources

  • [1]GHSA-5j4h-4f72-qpm6
  • [2]NVD - CVE-2026-21448

Attack Flow Diagram

Press enter or space to select a node. You can then use the arrow keys to move the node around. Press delete to remove it and escape to cancel.
Press enter or space to select an edge. You can then press delete to remove it or escape to cancel.