Esta página ainda não foi traduzida para o seu idioma. Exibindo conteúdo em inglês enquanto trabalhamos nisso.
💡 Keep dependencies up to date — most exploits target known, patchable vulnerabilities.
CVE-2026-45708: RCE in CubeCart v6 Ecommerce Software
Plataforma
php
Componente
cubecart-v6
Corrigido em
6.7.3
CVE-2026-45708 is a Remote Code Execution (RCE) vulnerability affecting CubeCart v6 ecommerce software. An attacker with administrative privileges and document editing permissions can inject malicious PHP code into the Invoice Editor. This code is then executed when any administrator attempts to print an order, allowing for arbitrary code execution on the server. The vulnerability impacts CubeCart versions 6.0.0 through 6.7.2 and is resolved in version 6.7.3.
Impacto e Cenários de Ataquetraduzindo…
Successful exploitation of CVE-2026-45708 allows an attacker to execute arbitrary code on the CubeCart server with the privileges of the web server user. This could lead to complete compromise of the system, including data theft, modification, and deletion. The attacker could potentially gain access to sensitive customer data, payment information, and other confidential business information. Given the ecommerce nature of CubeCart, the blast radius extends to all customers and partners interacting with the affected site. The vulnerability's reliance on a print function and .htaccess carve-out makes it relatively easy to trigger, increasing the risk of exploitation.
Contexto de Exploraçãotraduzindo…
CVE-2026-45708 was published on May 13, 2026. Its severity is rated as HIGH with a CVSS score of 7.2. There is currently no indication of active exploitation campaigns targeting this vulnerability. Public proof-of-concept (POC) code is likely to emerge given the vulnerability's relatively straightforward exploitation path. The vulnerability is not currently listed on CISA Known Exploited Vulnerabilities (KEV) catalog.
Inteligência de Ameaças
Status do Exploit
Vetor CVSS
O que significam essas métricas?
- Attack Vector
- Rede — explorável remotamente pela internet. Sem acesso físico ou local necessário.
- Attack Complexity
- Baixa — sem condições especiais. O atacante pode explorar de forma confiável.
- Privileges Required
- Alto — conta de administrador ou privilegiada necessária.
- User Interaction
- Nenhuma — ataque automático e silencioso. A vítima não faz nada.
- Scope
- Inalterado — impacto limitado ao componente vulnerável.
- Confidentiality
- Alto — perda total de confidencialidade. O atacante pode ler todos os dados.
- Integrity
- Alto — o atacante pode escrever, modificar ou excluir qualquer dado.
- Availability
- Alto — falha completa ou esgotamento de recursos. Negação de serviço total.
Software Afetado
Classificação de Fraqueza (CWE)
Linha do tempo
- Reservado
- Publicada
Mitigação e Soluções Alternativastraduzindo…
The primary mitigation for CVE-2026-45708 is to immediately upgrade CubeCart to version 6.7.3 or later. If upgrading is not immediately feasible, a temporary workaround involves restricting file access permissions for the files/print.*.php directory. Specifically, ensure that the web server user does not have write access to this directory. Additionally, consider implementing a Web Application Firewall (WAF) rule to block requests containing suspicious PHP code in the Invoice Editor. After upgrading, confirm the fix by attempting to print an order and verifying that no malicious code is executed.
Como corrigirtraduzindo…
Actualice CubeCart a la versión 6.7.3 o posterior para mitigar esta vulnerabilidad. La actualización corrige la forma en que se manejan las plantillas de factura, evitando la ejecución remota de código no autorizada.
Perguntas frequentestraduzindo…
What is CVE-2026-45708 — RCE in CubeCart v6?
CVE-2026-45708 is a Remote Code Execution vulnerability in CubeCart v6 ecommerce software. It allows an admin to inject malicious PHP code, leading to code execution when an order is printed. The CVSS score is 7.2 (HIGH).
Am I affected by CVE-2026-45708 in CubeCart v6?
You are affected if you are running CubeCart v6 versions 6.0.0 through 6.7.2. If you are using a later version, you are not vulnerable.
How do I fix CVE-2026-45708 in CubeCart v6?
Upgrade CubeCart to version 6.7.3 or later. As a temporary workaround, restrict file access permissions for the files/print.*.php directory.
Is CVE-2026-45708 being actively exploited?
There is currently no indication of active exploitation campaigns targeting CVE-2026-45708, but public POC code is likely to emerge.
Where can I find the official CubeCart advisory for CVE-2026-45708?
Refer to the official CubeCart security advisory on their website for detailed information and updates regarding CVE-2026-45708.
Seu projeto está afetado?
Envie seu arquivo de dependências e descubra na hora se esta e outras CVEs te atingem.
Experimente agora — sem conta
Faça upload de qualquer manifesto (composer.lock, package-lock.json, lista de plugins WordPress…) ou cole sua lista de componentes. Receba um relatório de vulnerabilidades instantaneamente. Fazer upload de um arquivo é só o começo: com uma conta, você obtém monitoramento contínuo, alertas por Slack/email, relatórios multiprojeto e white-label.
Arraste e solte seu arquivo de dependências
composer.lock, package-lock.json, requirements.txt, Gemfile.lock, pubspec.lock, Dockerfile...