Home

Description

CubeCart is an ecommerce software solution. Prior to 6.7.0, an Authenticated Server-Side Template Injection (SSTI) vulnerability exists in multiple modules of CubeCart (including Email Templates and Documents). The application unsafely evaluates user-supplied input directly through the Smarty template engine. By leveraging this, an authenticated attacker with administrative privileges can bypass current restrictions and call native PHP functions within the templates, such as readgzfile() to read sensitive configuration files, or error_log() to write a malicious PHP web shell, ultimately achieving Information Disclosure and full Remote Code Execution (RCE). This vulnerability is fixed in 6.7.0.

PUBLISHED Reserved 2026-05-05 | Published 2026-05-13 | Updated 2026-05-14 | Assigner GitHub_M




CRITICAL: 9.1CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

Problem types

CWE-94: Improper Control of Generation of Code ('Code Injection')

CWE-1336: Improper Neutralization of Special Elements Used in a Template Engine

Product status

< 6.7.0
affected

References

github.com/...art/v6/security/advisories/GHSA-wpjx-g695-qc5j exploit

github.com/...art/v6/security/advisories/GHSA-wpjx-g695-qc5j

github.com/...ommit/76d783c8c4d87a8a90dbfef1344a2733e7c6434c

cve.org (CVE-2026-44377)

nvd.nist.gov (CVE-2026-44377)

Download JSON