CVE-2025-59335

7.1 HIGH

📋 TL;DR

CubeCart ecommerce software versions before 6.5.11 fail to automatically expire user sessions after password changes. This allows attackers who have compromised an account to maintain access even after the legitimate user changes their password, as the attacker's session remains active. All CubeCart installations running vulnerable versions are affected.

💻 Affected Systems

Products:
  • CubeCart
Versions: All versions prior to 6.5.11
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All CubeCart installations with user accounts are vulnerable; no special configuration required.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Account takeover persists indefinitely despite password changes, enabling attackers to steal sensitive customer data, modify orders, access payment information, and maintain persistent control over compromised accounts.

🟠

Likely Case

Attackers maintain unauthorized access to user accounts for extended periods, potentially accessing personal information, order history, and performing fraudulent transactions.

🟢

If Mitigated

With proper session management controls, attackers lose access immediately upon password change, limiting exposure to the initial compromise window.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires initial account compromise through other means (phishing, credential stuffing, etc.), but maintaining access after password change is trivial.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.5.11

Vendor Advisory: https://github.com/cubecart/v6/security/advisories/GHSA-4vwh-x8m2-fmvv

Restart Required: No

Instructions:

1. Backup your CubeCart installation and database. 2. Download version 6.5.11 from the official CubeCart repository. 3. Replace all files with the patched version. 4. Verify the update completed successfully.

🔧 Temporary Workarounds

Manual Session Invalidation

all

Manually invalidate all active sessions after password changes by clearing session data

DELETE FROM CubeCart_sessions WHERE user_id = [USER_ID];

Reduce Session Lifetime

all

Configure shorter session timeout values to limit exposure window

Modify session.gc_maxlifetime in php.ini or .htaccess to reduce session duration

🧯 If You Can't Patch

  • Force all users to log out and create new sessions immediately
  • Implement additional authentication factors for sensitive operations

🔍 How to Verify

Check if Vulnerable:

Check CubeCart version in admin panel or examine /includes/global.inc.php for version number

Check Version:

grep -i 'version' /path/to/cubecart/includes/global.inc.php | head -1

Verify Fix Applied:

After updating to 6.5.11, test by changing a user password and verifying active sessions are terminated

📡 Detection & Monitoring

Log Indicators:

  • Multiple concurrent sessions from different IPs for same user account
  • Password change events followed by continued session activity from old IPs

Network Indicators:

  • Unusual login patterns with same session IDs persisting across password changes

SIEM Query:

source="cubecart_logs" (event="password_change") AND (same session_id before AND after change)

🔗 References

📤 Share & Export