CVE-2026-21446

9.8 CRITICAL

📋 TL;DR

Bagisto eCommerce platform versions before 2.3.10 have unprotected API endpoints that remain accessible after installation. Unauthenticated attackers can directly access these endpoints to create admin accounts, modify configurations, and overwrite data. All Bagisto 2.3.x deployments prior to 2.3.10 are affected.

💻 Affected Systems

Products:
  • Bagisto
Versions: 2.3.x versions prior to 2.3.10
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the eCommerce platform with attacker creating administrative accounts, modifying all configurations, and potentially destroying or exfiltrating all data.

🟠

Likely Case

Attacker creates backdoor admin accounts and modifies system configurations to maintain persistent access or disrupt operations.

🟢

If Mitigated

If network controls block external access to API endpoints, risk is limited to internal threats only.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Direct API endpoint access with no authentication required makes exploitation trivial.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.3.10

Vendor Advisory: https://github.com/bagisto/bagisto/security/advisories/GHSA-6h7w-v2xr-mqvw

Restart Required: Yes

Instructions:

1. Backup your current installation. 2. Update Bagisto to version 2.3.10 via composer: 'composer require bagisto/bagisto:2.3.10'. 3. Run database migrations if needed. 4. Restart web server services.

🔧 Temporary Workarounds

Block API Endpoints at Web Server

all

Configure web server to block access to /install/api/* endpoints

For Apache: add 'RedirectMatch 403 ^/install/api/.*$' to .htaccess
For Nginx: add 'location ~ ^/install/api/ { deny all; }' to site config

🧯 If You Can't Patch

  • Implement network-level blocking of /install/api/* endpoints using WAF or firewall rules
  • Monitor for unauthorized access attempts to installation API endpoints

🔍 How to Verify

Check if Vulnerable:

Check if accessing /install/api/ endpoints returns data without authentication. Test with curl: 'curl -v http://your-bagisto-site/install/api/check'

Check Version:

Check composer.json or run 'php artisan --version' to see Bagisto version

Verify Fix Applied:

After patching, verify that /install/api/* endpoints return 403 or 404 errors instead of functional responses

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to /install/api/* paths in web server logs
  • Unusual admin account creation events
  • Configuration modification events from unknown IPs

Network Indicators:

  • Unusual traffic patterns to installation API endpoints
  • POST requests to /install/api/* from external IPs

SIEM Query:

source="web_server_logs" AND (uri_path="/install/api/*" OR uri_path LIKE "/install/api/%")

🔗 References

📤 Share & Export