CVE-2025-60880

8.3 HIGH

📋 TL;DR

An authenticated stored XSS vulnerability in Bagisto 2.3.6 allows admin users to upload malicious SVG files containing JavaScript code. When viewed, this code executes in victims' browsers, potentially compromising admin sessions and enabling unauthorized actions. Only authenticated admin users can exploit this vulnerability.

💻 Affected Systems

Products:
  • Bagisto
Versions: 2.3.6
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires admin panel access; affects product creation functionality specifically.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete admin account takeover leading to full system compromise, data exfiltration, or ransomware deployment across the e-commerce platform.

🟠

Likely Case

Session hijacking of other admin users, theft of sensitive customer data, or unauthorized modifications to products/orders.

🟢

If Mitigated

Limited impact with proper admin user vetting and monitoring, though still poses insider threat risk.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated admin access; public proof-of-concept demonstrates SVG file creation and upload.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.3.7 or later

Vendor Advisory: https://github.com/bagisto/bagisto/security/advisories

Restart Required: No

Instructions:

1. Update Bagisto to version 2.3.7 or later. 2. Run composer update. 3. Clear application cache. 4. Verify SVG upload validation is working.

🔧 Temporary Workarounds

Disable SVG uploads

all

Temporarily disable SVG file uploads in product creation

Modify Bagisto configuration to restrict file uploads to non-SVG formats

Implement content security policy

all

Add CSP headers to restrict script execution from uploaded files

Add Content-Security-Policy header with script-src 'self'

🧯 If You Can't Patch

  • Implement strict admin user access controls and monitoring
  • Deploy web application firewall with XSS protection rules

🔍 How to Verify

Check if Vulnerable:

Check if running Bagisto 2.3.6 and test SVG upload with JavaScript payload in product creation

Check Version:

php artisan bagisto:version

Verify Fix Applied:

Verify version is 2.3.7+ and test that SVG files with script tags are rejected or sanitized

📡 Detection & Monitoring

Log Indicators:

  • Unusual SVG file uploads in admin logs
  • Multiple failed login attempts followed by SVG upload

Network Indicators:

  • Unusual outbound connections after admin panel access
  • SVG files with script tags in upload traffic

SIEM Query:

source="bagisto_logs" AND (event="file_upload" AND file_extension="svg")

🔗 References

📤 Share & Export