CVE-2026-21447

7.1 HIGH

📋 TL;DR

An Insecure Direct Object Reference vulnerability in Bagisto eCommerce platform allows authenticated customers to add items from other customers' orders to their own cart by manipulating order IDs. This exposes sensitive purchase information and enables potential fraud. All Bagisto installations prior to version 2.3.10 are affected.

💻 Affected Systems

Products:
  • Bagisto
Versions: All versions prior to 2.3.10
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated customer access; affects all Bagisto deployments with customer order functionality enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal sensitive customer purchase data, manipulate shopping carts for fraudulent transactions, and potentially escalate to financial fraud or data exfiltration.

🟠

Likely Case

Authenticated customers accessing other customers' order details and adding items to their carts without authorization, leading to data exposure and potential minor fraud.

🟢

If Mitigated

With proper access controls and input validation, only authorized access to order data would be permitted, preventing unauthorized cart manipulation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated customer access and simple parameter manipulation; no advanced technical skills needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.3.10

Vendor Advisory: https://github.com/bagisto/bagisto/security/advisories/GHSA-x5rw-qvvp-5cgm

Restart Required: No

Instructions:

1. Update Bagisto to version 2.3.10 or later via composer update. 2. Apply the security patch from the vendor advisory. 3. Verify the fix by testing order reorder functionality.

🔧 Temporary Workarounds

Disable Customer Order Reorder

all

Temporarily disable the customer order reorder functionality to prevent exploitation.

Modify Bagisto configuration to disable order reorder feature

Implement Additional Access Controls

all

Add server-side validation to ensure customers can only access their own order IDs.

Implement proper authorization checks in order controller

🧯 If You Can't Patch

  • Implement web application firewall rules to detect and block order ID parameter manipulation
  • Enable detailed logging of all order access attempts and monitor for unauthorized access patterns

🔍 How to Verify

Check if Vulnerable:

Test if authenticated customer can access another customer's order by manipulating order ID parameter in reorder request.

Check Version:

php artisan --version (for Laravel) or check Bagisto version in composer.json

Verify Fix Applied:

After patching, verify that order ID manipulation no longer allows access to other customers' orders.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed order access attempts from same user
  • Order ID parameter values outside expected range
  • Unusual cart activity patterns

Network Indicators:

  • HTTP requests with manipulated order ID parameters
  • Unusual order reorder request patterns

SIEM Query:

source="web_logs" AND (uri_path="/reorder" OR uri_path="/order") AND (param_order_id NOT IN expected_range OR param_order_id pattern mismatch)

🔗 References

📤 Share & Export