CVE-2025-56426

6.5 MEDIUM

📋 TL;DR

A remote code execution vulnerability in WebKul Bagisto v2.3.6 allows attackers to execute arbitrary code via the Cart/Checkout API endpoint. The price calculation logic fails to properly validate quantity inputs, enabling command injection. All Bagisto installations using the vulnerable version are affected.

💻 Affected Systems

Products:
  • WebKul Bagisto
Versions: v2.3.6
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Bagisto installations with Cart/Checkout functionality enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise allowing attackers to execute arbitrary commands, steal data, install malware, or pivot to other systems.

🟠

Likely Case

Price manipulation leading to financial loss, followed by data exfiltration or website defacement.

🟢

If Mitigated

Limited impact with proper input validation and API security controls in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires understanding of Bagisto's API structure and price calculation logic.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v2.3.7 or later

Vendor Advisory: https://medium.com/@rudranshsinghrajpurohit/cve-2025-56426-cart-price-manipulation-vulnerability-in-bagisto-cms-468b72311969

Restart Required: No

Instructions:

1. Backup your Bagisto installation. 2. Update to Bagisto v2.3.7 or later via composer update. 3. Clear cache and verify functionality.

🔧 Temporary Workarounds

Input Validation Middleware

all

Add custom middleware to validate quantity inputs before processing cart/checkout requests.

php artisan make:middleware ValidateCartInput

🧯 If You Can't Patch

  • Disable Cart/Checkout API endpoint if not essential
  • Implement WAF rules to block suspicious quantity parameter patterns

🔍 How to Verify

Check if Vulnerable:

Check if running Bagisto v2.3.6 by examining composer.json or admin panel version.

Check Version:

grep '"bagisto/bagisto"' composer.json

Verify Fix Applied:

Verify version is v2.3.7 or later and test cart functionality with various quantity inputs.

📡 Detection & Monitoring

Log Indicators:

  • Unusual quantity values in cart API logs
  • Multiple failed cart price calculations

Network Indicators:

  • Suspicious POST requests to /api/cart or /api/checkout with abnormal quantity parameters

SIEM Query:

source="web_logs" AND (uri_path="/api/cart" OR uri_path="/api/checkout") AND quantity=*

🔗 References

📤 Share & Export