CVE-2026-45055: CubeCart Password Reset Flaw Leads to Account Takeover
The National Vulnerability Database has detailed CVE-2026-45055, a critical vulnerability in CubeCart ecommerce software versions 6.6.x through 6.7.1. This flaw allows an unauthenticated attacker to hijack account password reset links by manipulating the Host request header. CubeCart, prior to version 6.7.2, constructs the CC_STORE_URL directly from this header without proper validation or an allowlist. This CC_STORE_URL is then embedded verbatim into transactional email links, most notably the password reset link.
An attacker, knowing a target’s email, can send a POST request to /index.php?_a=recover with a malicious Host header (e.g., Host: evil.com). CubeCart will then generate a valid password reset token and email a link pointing to the attacker’s controlled domain, such as http://evil.com/index.php?_a=recovery&validate=<TOKEN>. When the victim clicks this link, the attacker captures the valid token, enabling full account takeover. This is particularly dangerous if an administrator account is targeted, leading to complete store compromise.
This vulnerability, rated 8.1 (HIGH) on the CVSS scale, is a classic example of improper input validation (CWE-20, CWE-601). It highlights the critical risk of trusting client-supplied data without stringent sanitization and validation. The fix is available in CubeCart 6.7.2, which defenders must prioritize. The attacker’s calculus here is low effort for high reward: no authentication, just a crafted request and a victim’s click, leading directly to account or even store control.
What This Means For You
- If your organization uses CubeCart, you need to immediately verify your version. If you are running CubeCart 6.6.x through 6.7.1, patch to version 6.7.2 without delay. This isn't theoretical; an unauthenticated attacker can take over accounts, including admin accounts, with a simple social engineering trick. Audit your logs for suspicious password reset requests targeting your CubeCart instance, especially those with unusual `Host` headers.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-45055: CubeCart Password Reset Host Header Manipulation
title: CVE-2026-45055: CubeCart Password Reset Host Header Manipulation
id: scw-2026-05-13-ai-1
status: experimental
level: high
description: |
Detects the specific exploit pattern for CVE-2026-45055 by looking for POST requests to '/index.php?_a=recover' where the Host header (inferred from referer in some webserver logs) is manipulated to an attacker-controlled domain, indicating an attempt to hijack password reset links.
author: SCW Feed Engine (AI-generated)
date: 2026-05-13
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-45055/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: webserver
detection:
selection:
cs-uri-query|contains:
- '?_a=recover'
cs-method:
- 'POST'
referer|contains:
- 'evil.com'
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-45055 | Auth Bypass | CubeCart versions 6.6.x through 6.7.1 |
| CVE-2026-45055 | Auth Bypass | CubeCart builds CC_STORE_URL directly from Host request header |
| CVE-2026-45055 | Auth Bypass | Vulnerable endpoint: POST /index.php?_a=recover |
| CVE-2026-45055 | Auth Bypass | Vulnerable function: User::passwordRequest() and Admin::passwordRequest() |
| CVE-2026-45055 | Auth Bypass | Fixed in CubeCart version 6.7.2 |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 14, 2026 at 00:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.