Cyber Posture

CVE-2026-21448

CriticalPublic PoC

Published: 02 January 2026

Published
02 January 2026
Modified
08 January 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0019 40.1th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-21448 is a critical-severity Improper Neutralization of Special Elements Used in a Template Engine (CWE-1336) vulnerability in Webkul Bagisto. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 40.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-15 (Information Output Filtering).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly validates customer inputs like address fields to block malicious server-side template injection payloads before processing.

prevent

Filters and encodes user-supplied data when rendered in admin views to neutralize SSTI exploitation leading to RCE.

prevent

Mandates timely patching of known flaws, such as upgrading Bagisto to version 2.3.10, to remediate the SSTI vulnerability.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

CVE-2026-21448 is a server-side template injection vulnerability in a public-facing eCommerce web application, exploitable unauthenticated over the network to achieve remote code execution, directly mapping to T1190: Exploit Public-Facing Application.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

Bagisto is an open source laravel eCommerce platform. Versions prior to 2.3.10 are vulnerable to server-side template injection. When a normal customer orders any product, in the `add address` step they can inject a value to run in admin view.…

more

The issue can lead to remote code execution. Version 2.3.10 contains a patch.

Deeper analysisAI

CVE-2026-21448 is a server-side template injection vulnerability (CWE-1336) affecting Bagisto, an open-source Laravel eCommerce platform. Versions prior to 2.3.10 are vulnerable, allowing injection during the customer order process specifically in the "add address" step, where user-supplied input is rendered unsafely in the admin view. The flaw has a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity with high impacts on confidentiality, integrity, and availability.

A normal customer, without any privileges, can exploit this during the product ordering workflow by injecting malicious payloads into the address field. The injected content executes in the context of the admin view, potentially leading to remote code execution on the server. Attackers require only network access and can trigger the exploit with low complexity and no user interaction.

The official GitHub Security Advisory (GHSA-5j4h-4f72-qpm6) confirms that Bagisto version 2.3.10 addresses the issue with a patch. Security practitioners should upgrade to 2.3.10 or later and review input sanitization in address handling for custom deployments.

Details

CWE(s)

Affected Products

webkul
bagisto
≤ 2.3.10

CVEs Like This One

CVE-2026-21449Same product: Webkul Bagisto
CVE-2026-21450Same product: Webkul Bagisto
CVE-2026-21447Same product: Webkul Bagisto
CVE-2026-21446Same product: Webkul Bagisto
CVE-2026-21451Same product: Webkul Bagisto
CVE-2026-38530Same vendor: Webkul
CVE-2025-67325Same vendor: Webkul
CVE-2026-34587Shared CWE-1336
CVE-2025-55745Same vendor: Webkul
CVE-2025-53909Shared CWE-1336

References