Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-mqhg-v22x-pqj8

Опубликовано: 02 янв. 2026
Источник: github
Github: Прошло ревью
CVSS4: 7.4
CVSS3: 8.8

Описание

Bagisto is vulnerable to SSTI via name parameters provided by non-admin low-privilege users

Summary

SSTI is possible via first name and last name parameters provided by lowest-privileged users.

Details

  1. Go to http://127.0.0.1:8000/ and login or signup
  2. Go to http://127.0.0.1:8000/customer/account/profile
  3. Now edit the first name and last name to {{7*7}}
  4. Notice it appears as 49

POC

Impact

This can lead to RCE, command injection.

Пакеты

Наименование

bagisto/bagisto

composer
Затронутые версииВерсия исправления

< 2.3.10

2.3.10

EPSS

Процентиль: 20%
0.00063
Низкий

7.4 High

CVSS4

8.8 High

CVSS3

Дефекты

CWE-1336

Связанные уязвимости

CVSS3: 8.8
nvd
около 1 месяца назад

Bagisto is an open source laravel eCommerce platform. Versions prior to 2.3.10 are vulnerable to server-side template injection via first name and last name from a low-privilege user. Version 2.3.10 fixes the issue.

EPSS

Процентиль: 20%
0.00063
Низкий

7.4 High

CVSS4

8.8 High

CVSS3

Дефекты

CWE-1336