CVE-2026-21446
📋 TL;DR
Bagisto eCommerce platform versions before 2.3.10 have unprotected API endpoints that remain accessible after installation. Unauthenticated attackers can directly access these endpoints to create admin accounts, modify configurations, and overwrite data. All Bagisto 2.3.x deployments prior to 2.3.10 are affected.
💻 Affected Systems
- Bagisto
📦 What is this software?
Bagisto by Webkul
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of the eCommerce platform with attacker creating administrative accounts, modifying all configurations, and potentially destroying or exfiltrating all data.
Likely Case
Attacker creates backdoor admin accounts and modifies system configurations to maintain persistent access or disrupt operations.
If Mitigated
If network controls block external access to API endpoints, risk is limited to internal threats only.
🎯 Exploit Status
Direct API endpoint access with no authentication required makes exploitation trivial.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2.3.10
Vendor Advisory: https://github.com/bagisto/bagisto/security/advisories/GHSA-6h7w-v2xr-mqvw
Restart Required: Yes
Instructions:
1. Backup your current installation. 2. Update Bagisto to version 2.3.10 via composer: 'composer require bagisto/bagisto:2.3.10'. 3. Run database migrations if needed. 4. Restart web server services.
🔧 Temporary Workarounds
Block API Endpoints at Web Server
allConfigure web server to block access to /install/api/* endpoints
For Apache: add 'RedirectMatch 403 ^/install/api/.*$' to .htaccess
For Nginx: add 'location ~ ^/install/api/ { deny all; }' to site config
🧯 If You Can't Patch
- Implement network-level blocking of /install/api/* endpoints using WAF or firewall rules
- Monitor for unauthorized access attempts to installation API endpoints
🔍 How to Verify
Check if Vulnerable:
Check if accessing /install/api/ endpoints returns data without authentication. Test with curl: 'curl -v http://your-bagisto-site/install/api/check'
Check Version:
Check composer.json or run 'php artisan --version' to see Bagisto version
Verify Fix Applied:
After patching, verify that /install/api/* endpoints return 403 or 404 errors instead of functional responses
📡 Detection & Monitoring
Log Indicators:
- HTTP requests to /install/api/* paths in web server logs
- Unusual admin account creation events
- Configuration modification events from unknown IPs
Network Indicators:
- Unusual traffic patterns to installation API endpoints
- POST requests to /install/api/* from external IPs
SIEM Query:
source="web_server_logs" AND (uri_path="/install/api/*" OR uri_path LIKE "/install/api/%")