🔐 CVE Alert

CVE-2026-45708

HIGH 7.2

CubeCart: Authenticated RCE via Invoice Template → Order Print

CVSS Score
7.2
EPSS Score
0.0%
EPSS Percentile
0th

CubeCart is an ecommerce software solution. Prior to 6.7.3, an admin with documents edit permission can save raw <?php … ?> into the Invoice Editor. The next time any admin clicks Print on any order, the rendered template is written to files/print.<md5>.php. files/.htaccess ships an explicit <Files print.*.php> allow from all </Files> carve-out, so the file is fetched and executed by any unauthenticated visitor. This vulnerability is fixed in 6.7.3.

CWE CWE-94
Vendor cubecart
Product v6
Published May 13, 2026
Stay Ahead of the Next One

Get instant alerts for cubecart v6

Be the first to know when new high vulnerabilities affecting cubecart v6 are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

cubecart / v6
< 6.7.3

References

NVD ↗ CVE.org ↗ EPSS Data ↗
github.com: https://github.com/cubecart/v6/security/advisories/GHSA-747j-4mmc-cj63