Cette page n'a pas encore été traduite dans votre langue. Affichage du contenu en anglais pendant que nous y travaillons.
💡 Keep dependencies up to date — most exploits target known, patchable vulnerabilities.
CVE-2026-45708: RCE in CubeCart v6 Ecommerce Software
Plateforme
php
Composant
cubecart-v6
Corrigé dans
6.7.3
CVE-2026-45708 is a Remote Code Execution (RCE) vulnerability affecting CubeCart v6 ecommerce software. An attacker with administrative privileges and document editing permissions can inject malicious PHP code into the Invoice Editor. This code is then executed when any administrator attempts to print an order, allowing for arbitrary code execution on the server. The vulnerability impacts CubeCart versions 6.0.0 through 6.7.2 and is resolved in version 6.7.3.
Impact et Scénarios d'Attaquetraduction en cours…
Successful exploitation of CVE-2026-45708 allows an attacker to execute arbitrary code on the CubeCart server with the privileges of the web server user. This could lead to complete compromise of the system, including data theft, modification, and deletion. The attacker could potentially gain access to sensitive customer data, payment information, and other confidential business information. Given the ecommerce nature of CubeCart, the blast radius extends to all customers and partners interacting with the affected site. The vulnerability's reliance on a print function and .htaccess carve-out makes it relatively easy to trigger, increasing the risk of exploitation.
Contexte d'Exploitationtraduction en cours…
CVE-2026-45708 was published on May 13, 2026. Its severity is rated as HIGH with a CVSS score of 7.2. There is currently no indication of active exploitation campaigns targeting this vulnerability. Public proof-of-concept (POC) code is likely to emerge given the vulnerability's relatively straightforward exploitation path. The vulnerability is not currently listed on CISA Known Exploited Vulnerabilities (KEV) catalog.
Renseignement sur les Menaces
Statut de l'Exploit
Vecteur CVSS
Que signifient ces métriques?
- Attack Vector
- Réseau — exploitable à distance via internet. Aucun accès physique ou local requis.
- Attack Complexity
- Faible — aucune condition spéciale requise. Exploitable de manière fiable.
- Privileges Required
- Élevé — un compte administrateur ou privilégié est requis.
- User Interaction
- Aucune — attaque automatique et silencieuse. La victime ne fait rien.
- Scope
- Inchangé — impact limité au composant vulnérable.
- Confidentiality
- Élevé — perte totale de confidentialité. L'attaquant peut lire toutes les données.
- Integrity
- Élevé — l'attaquant peut écrire, modifier ou supprimer toutes les données.
- Availability
- Élevé — panne complète ou épuisement des ressources. Déni de service total.
Logiciel Affecté
Classification de Faiblesse (CWE)
Chronologie
- Réservé
- Publiée
Mitigation et Contournementstraduction en cours…
The primary mitigation for CVE-2026-45708 is to immediately upgrade CubeCart to version 6.7.3 or later. If upgrading is not immediately feasible, a temporary workaround involves restricting file access permissions for the files/print.*.php directory. Specifically, ensure that the web server user does not have write access to this directory. Additionally, consider implementing a Web Application Firewall (WAF) rule to block requests containing suspicious PHP code in the Invoice Editor. After upgrading, confirm the fix by attempting to print an order and verifying that no malicious code is executed.
Comment corrigertraduction en cours…
Actualice CubeCart a la versión 6.7.3 o posterior para mitigar esta vulnerabilidad. La actualización corrige la forma en que se manejan las plantillas de factura, evitando la ejecución remota de código no autorizada.
Questions fréquentestraduction en cours…
What is CVE-2026-45708 — RCE in CubeCart v6?
CVE-2026-45708 is a Remote Code Execution vulnerability in CubeCart v6 ecommerce software. It allows an admin to inject malicious PHP code, leading to code execution when an order is printed. The CVSS score is 7.2 (HIGH).
Am I affected by CVE-2026-45708 in CubeCart v6?
You are affected if you are running CubeCart v6 versions 6.0.0 through 6.7.2. If you are using a later version, you are not vulnerable.
How do I fix CVE-2026-45708 in CubeCart v6?
Upgrade CubeCart to version 6.7.3 or later. As a temporary workaround, restrict file access permissions for the files/print.*.php directory.
Is CVE-2026-45708 being actively exploited?
There is currently no indication of active exploitation campaigns targeting CVE-2026-45708, but public POC code is likely to emerge.
Where can I find the official CubeCart advisory for CVE-2026-45708?
Refer to the official CubeCart security advisory on their website for detailed information and updates regarding CVE-2026-45708.
Ton projet est-il affecté ?
Téléverse ton fichier de dépendances et découvre instantanément si cette CVE et d'autres te touchent.
Essayez maintenant — sans compte
scanZone.subtitle
Glissez-déposez votre fichier de dépendances
composer.lock, package-lock.json, requirements.txt, Gemfile.lock, pubspec.lock, Dockerfile...