このページはまだあなたの言語に翻訳されていません。翻訳作業中のため、英語でコンテンツを表示しています。

💡 Keep dependencies up to date — most exploits target known, patchable vulnerabilities.

HIGHCVE-2026-45708CVSS 7.2

CVE-2026-45708: RCE in CubeCart v6 Ecommerce Software

プラットフォーム

php

コンポーネント

cubecart-v6

修正版

6.7.3

あなたの言語に翻訳中…

CVE-2026-45708 is a Remote Code Execution (RCE) vulnerability affecting CubeCart v6 ecommerce software. An attacker with administrative privileges and document editing permissions can inject malicious PHP code into the Invoice Editor. This code is then executed when any administrator attempts to print an order, allowing for arbitrary code execution on the server. The vulnerability impacts CubeCart versions 6.0.0 through 6.7.2 and is resolved in version 6.7.3.

影響と攻撃シナリオ翻訳中…

Successful exploitation of CVE-2026-45708 allows an attacker to execute arbitrary code on the CubeCart server with the privileges of the web server user. This could lead to complete compromise of the system, including data theft, modification, and deletion. The attacker could potentially gain access to sensitive customer data, payment information, and other confidential business information. Given the ecommerce nature of CubeCart, the blast radius extends to all customers and partners interacting with the affected site. The vulnerability's reliance on a print function and .htaccess carve-out makes it relatively easy to trigger, increasing the risk of exploitation.

悪用の状況翻訳中…

CVE-2026-45708 was published on May 13, 2026. Its severity is rated as HIGH with a CVSS score of 7.2. There is currently no indication of active exploitation campaigns targeting this vulnerability. Public proof-of-concept (POC) code is likely to emerge given the vulnerability's relatively straightforward exploitation path. The vulnerability is not currently listed on CISA Known Exploited Vulnerabilities (KEV) catalog.

脅威インテリジェンス

エクスプロイト状況

概念実証不明
CISA KEVNO
インターネット露出

CVSS ベクトル

脅威インテリジェンス· CVSS 3.1CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H7.2HIGHAttack VectorNetwork攻撃者がターゲットに到達する方法Attack ComplexityLow悪用に必要な条件Privileges RequiredHigh攻撃に必要な認証レベルUser InteractionNone被害者の操作が必要かどうかScopeUnchanged影響コンポーネント外への波及ConfidentialityHigh機密データ漏洩のリスクIntegrityHigh不正データ改ざんのリスクAvailabilityHighサービス障害のリスクnextguardhq.com · CVSS v3.1 基本スコア
これらのメトリクスの意味は?
Attack Vector
ネットワーク — インターネット経由でリモートから悪用可能。物理・ローカルアクセス不要。
Attack Complexity
低 — 特別な条件不要。安定して悪用可能。
Privileges Required
高 — 管理者または特権アカウントが必要。
User Interaction
なし — 自動かつ無音の攻撃。被害者は何もしない。
Scope
変化なし — 影響は脆弱なコンポーネントのみ。
Confidentiality
高 — 機密性の完全喪失。全データが読み取り可能。
Integrity
高 — 任意のデータの書き込み・変更・削除が可能。
Availability
高 — 完全なクラッシュまたはリソース枯渇。完全なサービス拒否。

影響を受けるソフトウェア

コンポーネントcubecart-v6
ベンダーcubecart
最小バージョン6.0.0
最大バージョン< 6.7.3
修正版6.7.3

弱点分類 (CWE)

タイムライン

  1. 予約済み
  2. 公開日

緩和策と回避策翻訳中…

The primary mitigation for CVE-2026-45708 is to immediately upgrade CubeCart to version 6.7.3 or later. If upgrading is not immediately feasible, a temporary workaround involves restricting file access permissions for the files/print.*.php directory. Specifically, ensure that the web server user does not have write access to this directory. Additionally, consider implementing a Web Application Firewall (WAF) rule to block requests containing suspicious PHP code in the Invoice Editor. After upgrading, confirm the fix by attempting to print an order and verifying that no malicious code is executed.

修正方法翻訳中…

Actualice CubeCart a la versión 6.7.3 o posterior para mitigar esta vulnerabilidad. La actualización corrige la forma en que se manejan las plantillas de factura, evitando la ejecución remota de código no autorizada.

よくある質問翻訳中…

What is CVE-2026-45708 — RCE in CubeCart v6?

CVE-2026-45708 is a Remote Code Execution vulnerability in CubeCart v6 ecommerce software. It allows an admin to inject malicious PHP code, leading to code execution when an order is printed. The CVSS score is 7.2 (HIGH).

Am I affected by CVE-2026-45708 in CubeCart v6?

You are affected if you are running CubeCart v6 versions 6.0.0 through 6.7.2. If you are using a later version, you are not vulnerable.

How do I fix CVE-2026-45708 in CubeCart v6?

Upgrade CubeCart to version 6.7.3 or later. As a temporary workaround, restrict file access permissions for the files/print.*.php directory.

Is CVE-2026-45708 being actively exploited?

There is currently no indication of active exploitation campaigns targeting CVE-2026-45708, but public POC code is likely to emerge.

Where can I find the official CubeCart advisory for CVE-2026-45708?

Refer to the official CubeCart security advisory on their website for detailed information and updates regarding CVE-2026-45708.

あなたのプロジェクトは影響を受けていますか?

依存関係ファイルをアップロードすれば、このCVEや他のCVEがあなたに影響するか即座にわかります。

scanZone.liveBadgescanZone.eyebrow

今すぐ試す — アカウント不要

Upload any manifest (composer.lock, package-lock.json, WordPress plugin list…) or paste your component list. You get a vulnerability report instantly. Uploading a file is just the start: with an account you get continuous monitoring, Slack/email alerts, multi-project and white-label reports.

手動スキャンSlack/メールアラートContinuous monitoringホワイトラベルレポート

依存関係ファイルをドラッグ&ドロップ

composer.lock、package-lock.json、requirements.txt、Gemfile.lock、pubspec.lock、Dockerfile...