CubeCart RCE: Critical Flaw Exposes E-commerce Stores to Webshells
The National Vulnerability Database has disclosed a critical Remote Code Execution (RCE) vulnerability, CVE-2026-45053, affecting CubeCart e-commerce software versions prior to 6.7.0. This flaw resides in the REST API’s File Manager endpoint (POST /api/v1/files), allowing authenticated attackers with files:rw permissions to upload arbitrary PHP files.
Combined with a path-traversal vulnerability in the filepath parameter, this enables an attacker to write a webshell anywhere the web server process has write access, including the document root. This effectively grants full RCE capabilities, allowing attackers to compromise the entire e-commerce platform. The CVSS score is a staggering 9.1 (CRITICAL), underscoring the severity of this issue.
This isn’t just a theoretical bug; it’s a direct route to full system compromise. An attacker only needs an API key with specific file write permissions, which could be obtained through various means, including phishing or misconfiguration. Once a webshell is planted, sensitive customer data, payment information, and site integrity are all at risk. Defenders need to recognize that ‘authenticated’ does not mean ‘safe’ when combined with such a powerful arbitrary file upload.
What This Means For You
- If your organization uses CubeCart, you must immediately verify your version. Patch to 6.7.0 without delay. Furthermore, audit your API keys and their assigned permissions, especially those with `files:rw` access. Revoke any unnecessary keys and rotate existing ones. Check web server logs for suspicious file uploads or access attempts to `images/source/` or other web-accessible directories.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CubeCart RCE via Arbitrary File Upload - Webshell Upload - CVE-2026-45053
title: CubeCart RCE via Arbitrary File Upload - Webshell Upload - CVE-2026-45053
id: scw-2026-05-13-ai-1
status: experimental
level: critical
description: |
Detects the specific CubeCart API endpoint used for arbitrary file uploads (POST /api/v1/files) when a PHP file is uploaded to the 'images/source/' directory. This is the primary indicator of the CVE-2026-45053 vulnerability being exploited to upload a webshell.
author: SCW Feed Engine (AI-generated)
date: 2026-05-13
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-45053/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: webserver
detection:
selection:
cs-method:
- 'POST'
cs-uri:
- '/api/v1/files'
sc-status:
- '200'
uri|contains:
- 'images/source/'
selection_indicators:
uri|contains:
- '.php'
condition: selection AND selection_indicators
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-45053 | RCE | CubeCart < 6.7.0 |
| CVE-2026-45053 | Authenticated Arbitrary File Upload | CubeCart REST API File Manager endpoint (POST /api/v1/files) |
| CVE-2026-45053 | Path Traversal | CubeCart REST API File Manager endpoint filepath parameter |
| CVE-2026-45053 | Misconfiguration | CubeCart API key with files:rw permission allows PHP file upload to web-accessible directory |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 14, 2026 at 00:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.