Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-527q-4wqv-g9wj

Опубликовано: 16 окт. 2025
Источник: github
Github: Прошло ревью
CVSS3: 5.1

Описание

bagisto has Server Side Template Injection (SSTI) in Product Description

Summary

Bagisto v2.3.7 is vulnerable to Server-Side Template Injection (SSTI) due to unsanitized user input being processed by the server-side templating engine when rendering product descriptions. This allows an attacker with product creation privileges to inject arbitrary template expressions that are evaluated by the backend — potentially leading to Remote Code Execution (RCE) on the server.

Details

In Bagisto, product descriptions are rendered through Laravel’s Blade templating engine in various front-end and admin views. The product description field is not sanitized or escaped before being passed to the view, which means user-supplied data can break out of the expected string context and execute arbitrary template code.

PoC

Create a product and enter the payload to the description. image Preview the page, observed that the template expressions were evaluated by the backend and displayed on the screen. image

Impact

RCE potential: Attackers can execute arbitrary PHP code or system commands. Data breach: Read sensitive environment variables (.env), API keys, or database credentials. Defacement / persistence: Inject malicious scripts or backdoors in dynamic templates. Privilege escalation: If attackers have limited roles (e.g., product manager), they can compromise the entire application or host.

Пакеты

Наименование

bagisto/bagisto

composer
Затронутые версииВерсия исправления

<= 2.3.7

2.3.8

EPSS

Процентиль: 42%
0.00197
Низкий

5.1 Medium

CVSS3

Дефекты

CWE-1336
CWE-94

Связанные уязвимости

CVSS3: 5.1
nvd
4 месяца назад

Bagisto is an open source laravel eCommerce platform. Bagisto v2.3.7 is vulnerable to Server-Side Template Injection (SSTI) due to unsanitized user input being processed by the server-side templating engine when rendering product descriptions. This allows an attacker with product creation privileges to inject arbitrary template expressions that are evaluated by the backend — potentially leading to Remote Code Execution (RCE) on the server. This vulnerability is fixed in 2.3.8.

EPSS

Процентиль: 42%
0.00197
Низкий

5.1 Medium

CVSS3

Дефекты

CWE-1336
CWE-94