CubeCart RCE (CVE-2026-45708) Allows Unauthenticated Remote Code Execution
The National Vulnerability Database has detailed CVE-2026-45708, a critical remote code execution (RCE) vulnerability in CubeCart, an e-commerce software solution. This flaw, present in versions prior to 6.7.3, allows an authenticated administrator with document edit permissions to inject raw PHP code into the Invoice Editor. While this requires initial admin access, the subsequent execution chain is alarming.
Once the malicious PHP is saved, any admin clicking ‘Print’ on an order triggers the template rendering, writing the injected code to a file named print.<md5>.php within the files/ directory. Crucially, the .htaccess configuration explicitly permits unauthenticated access to print.*.php files. This means an unauthenticated attacker can then simply fetch this generated file, leading to arbitrary remote code execution on the server. The CVSS score of 7.2 (HIGH) reflects the severe impact and ease of exploitation once the initial condition is met.
For defenders, the key takeaway is clear: this is a supply chain risk through administrative compromise. An attacker first needs to gain high-level access to the CubeCart admin panel, but the RCE then allows for complete system takeover. This isn’t just a defacement; it’s a full compromise channel for e-commerce platforms, potentially exposing customer data, payment information, and allowing for persistent backdoor installation.
What This Means For You
- If your organization uses CubeCart, you must immediately verify that all instances are patched to version 6.7.3 or higher. Prioritize this, as an attacker with admin credentials can escalate to full server compromise through this vulnerability. Audit your admin logs for suspicious activity, especially around invoice editing and template modifications, if you were running vulnerable versions.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CubeCart RCE via Invoice Editor - PHP Code Injection - CVE-2026-45708
title: CubeCart RCE via Invoice Editor - PHP Code Injection - CVE-2026-45708
id: scw-2026-05-13-ai-1
status: experimental
level: critical
description: |
Detects the initial exploitation of CubeCart CVE-2026-45708. This rule looks for POST requests to the documents.php endpoint with parameters indicating an attempt to save raw PHP code into the invoice editor, which is the first step in achieving RCE.
author: SCW Feed Engine (AI-generated)
date: 2026-05-13
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-45708/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: webserver
detection:
selection:
cs-uri|contains:
- '/admin/documents.php'
cs-method:
- 'POST'
cs-uri-query|contains:
- 'action=save'
selection_base:
cs-uri-query|contains:
- 'edit=invoice'
selection_indicators:
cs-uri-query|contains:
- 'raw=1'
condition: selection AND selection_base AND selection_indicators
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-45708 | RCE | CubeCart ecommerce software |
| CVE-2026-45708 | RCE | CubeCart versions prior to 6.7.3 |
| CVE-2026-45708 | RCE | Vulnerable component: Invoice Editor allows saving raw PHP |
| CVE-2026-45708 | RCE | Exploitation vector: files/print. |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 14, 2026 at 00:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.