Description
Bagisto is an open source laravel eCommerce platform. Versions prior to 2.3.10 are vulnerable to server-side template injection via first name and last name from a low-privilege user. Version 2.3.10 fixes the issue.
Published: 2026-01-02
Score: 7.4 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution via Server‑Side Template Injection
Action: Patch
AI Analysis

Impact

Bagisto allows injection of template expressions through the first and last name fields supplied by low‑privilege users. The likely attack vector is a low‑privilege user creating or editing a customer profile to supply malicious payloads in the name fields. Based on the description, it is inferred that the unsanitized input is rendered by the server, enabling an attacker to execute arbitrary code within the application context. The vulnerability is classified as CWE‑1336, server‑side template injection, which can compromise confidentiality, integrity, and availability of the platform.

Affected Systems

The affected product is the Bagisto eCommerce platform. All releases prior to version 2.3.10 are impacted; version 2.3.10 and later contain the fix.

Risk and Exploitability

The CVSS score of 7.4 indicates a high severity. EPSS is listed as less than 1%, suggesting a low current exploitation probability. The vulnerability is not present in the CISA Known Exploited Vulnerabilities catalog. An attacker can exploit the flaw by creating or editing a customer profile, supplying malicious payloads in the name fields, and the server will evaluate them during template rendering.

Generated by OpenCVE AI on April 18, 2026 at 20:12 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Bagisto to version 2.3.10 or newer to apply the vendor‑provided fix.
  • Sanitize or escape all user‑supplied first and last name inputs before rendering them within templates.
  • Implement monitoring to detect suspicious template injection attempts and review logs for unauthorized code execution.

Generated by OpenCVE AI on April 18, 2026 at 20:12 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-mqhg-v22x-pqj8 Bagisto is vulnerable to SSTI via name parameters provided by non-admin low-privilege users
History

Thu, 08 Jan 2026 21:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:webkul:bagisto:*:*:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Mon, 05 Jan 2026 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Webkul
Webkul bagisto
Vendors & Products Webkul
Webkul bagisto

Fri, 02 Jan 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 02 Jan 2026 20:45:00 +0000

Type Values Removed Values Added
Description Bagisto is an open source laravel eCommerce platform. Versions prior to 2.3.10 are vulnerable to server-side template injection via first name and last name from a low-privilege user. Version 2.3.10 fixes the issue.
Title Bagisto has SSTI via first and last name from low-privilege user (not admin)
Weaknesses CWE-1336
References
Metrics cvssV4_0

{'score': 7.4, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-01-02T21:27:39.053Z

Reserved: 2025-12-29T03:00:29.277Z

Link: CVE-2026-21449

cve-icon Vulnrichment

Updated: 2026-01-02T21:27:30.570Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-02T21:16:02.647

Modified: 2026-01-08T21:21:59.040

Link: CVE-2026-21449

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T20:15:09Z

Weaknesses