此页面尚未翻译为您的语言。我们正在努力翻译,目前显示英文内容。
💡 Keep dependencies up to date — most exploits target known, patchable vulnerabilities.
CVE-2026-44377: RCE in CubeCart v6 Ecommerce Software
翻译中…平台
php
组件
cubecart-v6
修复版本
6.7.0
A critical Remote Code Execution (RCE) vulnerability (CVE-2026-44377) has been identified in CubeCart v6, an ecommerce software solution. This vulnerability stems from an Authenticated Server-Side Template Injection (SSTI) flaw within multiple modules, allowing an attacker with administrative privileges to execute arbitrary code. The vulnerability impacts versions 6.0.0 through 6.6.9, and a patch is available in version 6.7.0.
影响与攻击场景翻译中…
The impact of CVE-2026-44377 is severe. An authenticated attacker, possessing administrative access to a CubeCart v6 instance, can leverage the SSTI vulnerability to bypass security restrictions and directly call native PHP functions within templates. This allows for a wide range of malicious actions, including reading sensitive configuration files (e.g., using readgzfile()) and, critically, writing malicious PHP web shells. Successful exploitation grants the attacker complete control over the affected server, enabling data theft, modification, and further lateral movement within the network. The potential for data exfiltration and system takeover is significant, mirroring the impact of other SSTI vulnerabilities like those seen in earlier template engines.
利用背景翻译中…
CVE-2026-44377 was published on May 13, 2026. Its severity is rated CRITICAL (CVSS 9.1). As of this writing, there are no publicly known active campaigns exploiting this vulnerability. However, the ease of exploitation and the potential for significant impact suggest that it will likely become a target for malicious actors. Public Proof-of-Concept (POC) code is anticipated to emerge, increasing the risk of exploitation. The vulnerability is not currently listed on KEV or EPSS, indicating a low to medium probability of exploitation in the short term, but this could change rapidly.
威胁情报
漏洞利用状态
CVSS 向量
这些指标意味着什么?
- Attack Vector
- 网络 — 可通过互联网远程利用,无需物理或本地访问。攻击面最大。
- Attack Complexity
- 低 — 无需特殊条件,可以稳定地利用漏洞。
- Privileges Required
- 高 — 需要管理员或特权账户。
- User Interaction
- 无 — 攻击自动且无声,受害者无需任何操作。
- Scope
- 已改变 — 攻击可以超出脆弱组件,影响其他系统。
- Confidentiality
- 高 — 完全丧失机密性,攻击者可读取所有数据。
- Integrity
- 高 — 攻击者可写入、修改或删除任何数据。
- Availability
- 高 — 完全崩溃或资源耗尽,完全拒绝服务。
受影响的软件
弱点分类 (CWE)
时间线
- 已保留
- 发布日期
缓解措施和替代方案翻译中…
The primary mitigation for CVE-2026-44377 is to immediately upgrade CubeCart to version 6.7.0, which contains the necessary fix. If upgrading is not immediately feasible, consider implementing temporary workarounds. While a direct WAF rule targeting the SSTI payload is difficult to create due to the dynamic nature of template injection, strict input validation on all user-supplied data within CubeCart templates can help reduce the attack surface. Review and restrict access to sensitive configuration files to limit potential data exposure. Monitor CubeCart logs for suspicious activity, particularly attempts to execute unusual PHP functions within templates. After upgrading to 6.7.0, verify the fix by attempting to inject a simple PHP payload within a template and confirming that it is properly sanitized and does not execute.
修复方法翻译中…
Actualice CubeCart a la versión 6.7.0 o posterior para mitigar la vulnerabilidad de inyección de plantillas del lado del servidor (SSTI). Esta actualización corrige la forma en que se evalúan las plantillas, evitando la ejecución de código PHP no autorizado a través de la entrada del usuario.
常见问题翻译中…
What is CVE-2026-44377 — RCE in CubeCart v6?
CVE-2026-44377 is a critical Remote Code Execution (RCE) vulnerability in CubeCart v6 ecommerce software. It allows authenticated administrators to execute arbitrary PHP code through an SSTI flaw, potentially leading to full system compromise.
Am I affected by CVE-2026-44377 in CubeCart v6?
You are affected if you are running CubeCart v6 versions 6.0.0 through 6.6.9. Upgrade to version 6.7.0 to address this vulnerability.
How do I fix CVE-2026-44377 in CubeCart v6?
The recommended fix is to upgrade CubeCart to version 6.7.0. If immediate upgrade is not possible, implement temporary workarounds like strict input validation and restricting access to sensitive files.
Is CVE-2026-44377 being actively exploited?
As of the current date, there are no publicly known active campaigns exploiting CVE-2026-44377, but the vulnerability's severity and ease of exploitation suggest it may become a target.
Where can I find the official CubeCart advisory for CVE-2026-44377?
Refer to the official CubeCart security advisory for CVE-2026-44377 on the CubeCart website or their security announcement channels. (Link will be available upon official release).
立即试用 — 无需账户
上传任何清单文件 (composer.lock, package-lock.json, WordPress 插件列表…) 或粘贴您的组件列表。您立即获得一份漏洞报告。上传文件只是开始:拥有账户后,您将获得持续监控、Slack/电子邮件警报、多项目和白标报告。
拖放您的依赖文件
composer.lock、package-lock.json、requirements.txt、Gemfile.lock、pubspec.lock、Dockerfile...