We found results for “”
CVE-2026-21446
Good to know:
Date: January 2, 2026
Bagisto is an open source laravel eCommerce platform. In versions on the 2.3 branch prior to 2.3.10, API routes remain active even after initial installation is complete. The underlying API endpoints ("/install/api/*") are directly accessible and exploitable without any authentication. An attacker can bypass the Ib installer entirely by calling the API endpoints directly. This allows any unauthenticated attacker to create admin accounts, modify application configurations, and potentially overwrite existing data. Version 2.3.10 fixes the issue.
Severity Score
Related Resources (5)
Severity Score
Weakness Type (CWE)
Missing Authentication for Critical Function
CWE-306Top Fix
Upgrade Version
Upgrade to version bagisto/bagisto - v2.3.10;https://github.com/bagisto/bagisto.git - v2.3.10
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | LOW |
| Privileges Required (PR): | NONE |
| User Interaction (UI): | NONE |
| Scope (S): | UNCHANGED |
| Confidentiality (C): | HIGH |
| Integrity (I): | HIGH |
| Availability (A): | NONE |
Vulnerabilities
Projects
Contact Us


