🔐 CVE Alert

CVE-2026-45055

HIGH 8.1

CubeCart: Pre-Authenticated Password Reset Link Poisoning via HTTP Host Header

CVSS Score
8.1
EPSS Score
0.0%
EPSS Percentile
0th

CubeCart is an ecommerce software solution. Prior to 6.7.2, CubeCart 6.6.x – 6.7.1 builds CC_STORE_URL directly from the Host request header at bootstrap, with no allowlist. The constant is embedded verbatim into transactional email links, most critically the password-reset link in User::passwordRequest() (and the admin equivalent in Admin::passwordRequest()). An unauthenticated attacker who knows a target email can POST /index.php?_a=recover with Host: evil.com; CubeCart writes a fresh verify token (valid 3,600 s) and emails the victim a link http://evil.com/index.php?_a=recovery&validate=<TOKEN>. The token is valid against the legitimate store — capturing the victim's click on evil.com yields full account takeover, or store takeover when an admin email is targeted. This vulnerability is fixed in 6.7.2.

CWE CWE-20 CWE-345 CWE-601 CWE-784
Vendor cubecart
Product v6
Published May 13, 2026
Stay Ahead of the Next One

Get instant alerts for cubecart v6

Be the first to know when new high vulnerabilities affecting cubecart v6 are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None

Affected Versions

cubecart / v6
< 6.7.2

References

NVD ↗ CVE.org ↗ EPSS Data ↗
github.com: https://github.com/cubecart/v6/security/advisories/GHSA-7pvc-gxc4-chmc