Description
Bagisto is an open source laravel eCommerce platform. Prior to version 2.3.10, an Insecure Direct Object Reference vulnerability in the customer order reorder function allows any authenticated customer to add items from another customer's order to their own shopping cart by manipulating the order ID parameter. This exposes sensitive purchase information and enables potential fraud. Version 2.3.10 patches the issue.
Published: 2026-01-02
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Order Reuse and Sensitive Purchase Data Exposure
Action: Patching
AI Analysis

Impact

Bagisto, an open‑source Laravel eCommerce platform, contains an Insecure Direct Object Reference in the customer order reorder endpoint. When a customer is logged in, the system does not verify that the order identifier supplied in the request belongs to that customer. An attacker can therefore alter the order ID parameter, causing the platform to load another customer’s order and add those items to their own cart. This flaw enables the attacker to view the contents of other users’ orders, duplicate purchases, and potentially commit fraud. The weak points reflected in CWE-284 and CWE-639 underline the lack of proper access control and user‑controlled key validation.

Affected Systems

All Bagisto installations running a version earlier than 2.3.10 are vulnerable. The affected product is Bagisto, as identified by its CNA vendor/product designation. Versions 2.3.10 and later include the patch that closes the issue.

Risk and Exploitability

The CVSS score of 7.1 indicates a high severity vulnerability that can result in serious privacy and financial harm. The EPSS score of less than 1% suggests that, as of the latest analysis, exploitation opportunities are currently rare, but the flaw remains present and discoverable by any authenticated account. The vulnerability is not listed in the CISA KEV catalog, yet a public advisory from Bagisto and a commit that fixes the bug have been published. Attackers with a valid user session can exploit the IDOR by simply changing the order identifier in the request, making the risk straightforward to realize without advanced tooling.

Generated by OpenCVE AI on April 18, 2026 at 19:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Bagisto to 2.3.10 or later, which removes the IDOR flaw.
  • Implement server‑side validation to confirm that the order ID supplied is owned by the authenticated customer before processing a reorder request; reject any mismatched attempts.
  • Disable or limit the reorder functionality for guest users until a reliable ownership check is in place.

Generated by OpenCVE AI on April 18, 2026 at 19:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-x5rw-qvvp-5cgm Bagisto has IDOR in Customer Order Reorder Functionality
History

Thu, 08 Jan 2026 21:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:webkul:bagisto:*:*:*:*:*:*:*:*

Mon, 05 Jan 2026 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Webkul
Webkul bagisto
Vendors & Products Webkul
Webkul bagisto

Fri, 02 Jan 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 02 Jan 2026 20:30:00 +0000

Type Values Removed Values Added
Description Bagisto is an open source laravel eCommerce platform. Prior to version 2.3.10, an Insecure Direct Object Reference vulnerability in the customer order reorder function allows any authenticated customer to add items from another customer's order to their own shopping cart by manipulating the order ID parameter. This exposes sensitive purchase information and enables potential fraud. Version 2.3.10 patches the issue.
Title Bagisto has IDOR in Customer Order Reorder Functionality
Weaknesses CWE-284
CWE-639
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-01-02T21:30:38.620Z

Reserved: 2025-12-29T03:00:29.277Z

Link: CVE-2026-21447

cve-icon Vulnrichment

Updated: 2026-01-02T21:30:32.295Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-02T21:15:58.773

Modified: 2026-01-08T21:24:08.743

Link: CVE-2026-21447

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T19:30:08Z

Weaknesses