Description
Bagisto is an open source laravel eCommerce platform. A stored Cross-Site Scripting (XSS) vulnerability exists in Bagisto prior to version 2.3.10 within the CMS page editor. Although the platform normally attempts to sanitize `<script>` tags, the filtering can be bypassed by manipulating the raw HTTP POST request before submission. As a result, arbitrary JavaScript can be stored in the CMS content and executed whenever the page is viewed or edited. This exposes administrators to a high-severity risk, including complete account takeover, backend hijacking, and malicious script execution. Version 2.3.10 fixes the issue.
Published: 2026-01-02
Score: 5.2 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting allowing arbitrary script execution and potential account takeover
Action: Patch Now
AI Analysis

Impact

Bagisto, an open‑source Laravel eCommerce platform, contains a stored XSS flaw in the CMS page editor. The platform normally sanitizes <script> tags, but an attacker can bypass this check by manipulating the raw HTTP POST payload before it is processed. This allows the attacker to store malicious JavaScript that will be executed whenever the CMS page is viewed or edited, potentially leading to account hijacking and backend compromise. The vulnerability is rated CW‑79: Cross‑Site Scripting.

Affected Systems

Vendors listed under bagisto:bagisto; any deployment of Bagisto earlier than version 2.3.10 is affected. Version 2.3.10 and later contain the fix and are not vulnerable.

Risk and Exploitability

The CVSS score of 5.2 indicates moderate severity, while the EPSS of less than 1% suggests a very low probability of observed exploitation. The vulnerability is not listed in the CISA KEV catalog. Inferred attack scenarios involve an attacker with CMS editing privileges submitting a crafted POST request, or an administrator inadvertently saving malicious content. Once stored, the payload will run in the browser context of any user viewing or editing the page.

Generated by OpenCVE AI on April 18, 2026 at 08:28 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Bagisto to version 2.3.10 or later.
  • Limit CMS editing permissions to a minimal set of trusted users.
  • Implement additional input validation and content‑security‑policy controls to restrict embedded JavaScript.

Generated by OpenCVE AI on April 18, 2026 at 08:28 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-2mwc-h2mg-v6p8 Bagisto has HTML Filter Bypass that Enables Stored XSS
History

Thu, 08 Jan 2026 21:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:webkul:bagisto:*:*:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 8.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H'}


Mon, 05 Jan 2026 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Webkul
Webkul bagisto
Vendors & Products Webkul
Webkul bagisto

Fri, 02 Jan 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 02 Jan 2026 20:45:00 +0000

Type Values Removed Values Added
Description Bagisto is an open source laravel eCommerce platform. A stored Cross-Site Scripting (XSS) vulnerability exists in Bagisto prior to version 2.3.10 within the CMS page editor. Although the platform normally attempts to sanitize `<script>` tags, the filtering can be bypassed by manipulating the raw HTTP POST request before submission. As a result, arbitrary JavaScript can be stored in the CMS content and executed whenever the page is viewed or edited. This exposes administrators to a high-severity risk, including complete account takeover, backend hijacking, and malicious script execution. Version 2.3.10 fixes the issue.
Title Bagisto has HTML Filter Bypass that Enables Stored XSS
Weaknesses CWE-79
References
Metrics cvssV4_0

{'score': 5.2, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-01-02T21:25:51.523Z

Reserved: 2025-12-29T03:00:29.277Z

Link: CVE-2026-21451

cve-icon Vulnrichment

Updated: 2026-01-02T21:25:47.080Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-02T21:16:02.930

Modified: 2026-01-08T21:20:06.553

Link: CVE-2026-21451

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T08:30:35Z

Weaknesses