๐Ÿ” CVE Alert

CVE-2026-45054

MEDIUM 4.9

CubeCart: Authenticated SQL Injection via `sort[]` Parameter in Admin Orders Transactions Listing

CVSS Score
4.9
EPSS Score
0.0%
EPSS Percentile
0th

CubeCart is an ecommerce software solution. Prior to 6.7.0, the admin orders-transactions listing page (admin.php?_g=orders&node=transactions) builds a raw ORDER BY SQL fragment from the attacker-controlled $_GET['sort'] array without column or direction validation. Both the column key and the direction value flow into the query string as bare SQL tokens, and the framework's sqlSafe() (mysqli escape_string) escapes only quote characters โ€” none of which are required for ORDER BY injection. An authenticated administrator with the minimum CC_PERM_READ permission on orders can execute arbitrary SQL against the store database, including time-based blind extraction of admin password hashes, customer PII, and integrated payment-gateway credentials. This vulnerability is fixed in 6.7.0.

CWE CWE-89
Vendor cubecart
Product v6
Published May 13, 2026
Stay Ahead of the Next One

Get instant alerts for cubecart v6

Be the first to know when new medium vulnerabilities affecting cubecart v6 are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None

Affected Versions

cubecart / v6
< 6.7.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/cubecart/v6/security/advisories/GHSA-rm2f-rpcq-6w9f