Home

Description

CubeCart is an ecommerce software solution. Prior to 6.7.0, an Authenticated Arbitrary File Upload vulnerability exists in the REST API File Manager endpoint (POST /api/v1/files) of CubeCart. The endpoint allows any holder of an API key with files:rw permission to upload PHP source files into the web-accessible images/source/ directory, where they are executed by the web server. Combined with a path-traversal flaw in the same endpoint's filepath parameter, a single API request writes a webshell anywhere the webserver process can write — including the document root — yielding full Remote Code Execution. This vulnerability is fixed in 6.7.0.

PUBLISHED Reserved 2026-05-08 | Published 2026-05-13 | Updated 2026-05-15 | Assigner GitHub_M




CRITICAL: 9.1CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

Problem types

CWE-434: Unrestricted Upload of File with Dangerous Type

Product status

< 6.7.0
affected

References

github.com/...art/v6/security/advisories/GHSA-652f-8c88-25cx exploit

github.com/...art/v6/security/advisories/GHSA-652f-8c88-25cx

cve.org (CVE-2026-45053)

nvd.nist.gov (CVE-2026-45053)

Download JSON