CVE-2026-44377: Critical RCE in CubeCart eCommerce Platform
The National Vulnerability Database (NVD) has detailed CVE-2026-44377, a critical Authenticated Server-Side Template Injection (SSTI) vulnerability in CubeCart, an e-commerce software solution. This flaw, present in versions prior to 6.7.0, allows an authenticated attacker with administrative privileges to bypass security restrictions within multiple modules, including Email Templates and Documents. The application’s unsafe evaluation of user-supplied input via the Smarty template engine is the root cause.
By exploiting this vulnerability, an attacker can execute arbitrary PHP functions. The NVD highlights two critical examples: using readgzfile() to exfiltrate sensitive configuration files and error_log() to write a malicious PHP web shell. This chain of exploitation ultimately leads to information disclosure and full Remote Code Execution (RCE), granting the attacker complete control over the affected e-commerce platform.
The CVSSv3.1 score of 9.1 (Critical) underscores the severity. For defenders, this means a direct path to total compromise if an admin account is breached or misused. Patching to version 6.7.0 or later is the only definitive mitigation. Given the high impact, organizations running vulnerable CubeCart instances must prioritize this update immediately.
What This Means For You
- If your organization uses CubeCart, you need to check your version immediately. An authenticated admin account is all an attacker needs to achieve full Remote Code Execution and compromise your entire e-commerce store. This isn't theoretical; the path to RCE is direct and well-defined by the vulnerability details. Patch to CubeCart version 6.7.0 or later without delay.
Related ATT&CK Techniques
🛡️ Detection Rules
4 rules · 6 SIEM formats4 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-44377: CubeCart SSTI RCE via Smarty Template Injection
title: CVE-2026-44377: CubeCart SSTI RCE via Smarty Template Injection
id: scw-2026-05-13-ai-1
status: experimental
level: critical
description: |
Detects attempts to exploit CVE-2026-44377 by targeting the edit.inc.php script in CubeCart with a POST request containing a template parameter, indicative of Server-Side Template Injection (SSTI) aimed at achieving Remote Code Execution (RCE).
author: SCW Feed Engine (AI-generated)
date: 2026-05-13
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-44377/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: webserver
detection:
selection:
cs-uri|contains:
- '/admin/sources/edit.inc.php'
cs-uri-query|contains:
- 'template='
cs-method|exact: 'POST'
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-44377 | RCE | CubeCart < 6.7.0 |
| CVE-2026-44377 | Server-Side Template Injection | CubeCart: Email Templates module |
| CVE-2026-44377 | Server-Side Template Injection | CubeCart: Documents module |
| CVE-2026-44377 | Information Disclosure | CubeCart: Smarty template engine unsafe evaluation leading to readgzfile() |
| CVE-2026-44377 | Code Injection | CubeCart: Smarty template engine unsafe evaluation leading to error_log() for web shell |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 14, 2026 at 00:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.