Advisories for Composer/Bagisto/Bagisto package

2026

Bagisto Missing Authentication on Installer API Endpoints

Vulnerable Code File: packages/Ibkul/Installer/src/Routes/Ib.php <?php use Illuminate\Session\Middleware\StartSession; use Illuminate\Support\Facades\Route; use Ibkul\Installer\Http\Controllers\InstallerController; Route::middleware(['Ib', 'installer_locale'])-&gt;group(function () { Route::controller(InstallerController::class)-&gt;group(function () { Route::get('install', 'index')-&gt;name('installer.index'); Route::middleware(StartSession::class)-&gt;prefix('install/api')-&gt;group(function () { Route::post('env-file-setup', 'envFileSetup')-&gt;name('installer.env_file_setup'); Route::post('run-migration', 'runMigration')-&gt;name('installer.run_migration')-&gt;withoutMiddleware('Ib'); Route::post('run-seeder', 'runSeeder')-&gt;name('installer.run_seeder')-&gt;withoutMiddleware('Ib'); Route::get('download-sample', 'downloadSample')-&gt;name('installer.download_sample')-&gt;withoutMiddleware('Ib'); Route::post('admin-config-setup', 'adminConfigSetup')-&gt;name('installer.admin_config_setup')-&gt;withoutMiddleware('Ib'); Route::post('sample-products-setup', 'createSampleProducts')-&gt;name('installer.sample_products_setup')-&gt;withoutMiddleware('Ib'); }); }); }); API routes remain active even after initial installation is complete, allowing any unauthenticated attacker to: Create admin accounts Modify application configuration Potentially overwrite existing data the underlying API endpoints (/install/api/*) are directly …

Bagisto has HTML Filter Bypass that Enables Stored XSS

A stored Cross-Site Scripting (XSS) vulnerability exists in Bagisto 2.3.8 within the CMS page editor. Although the platform normally attempts to sanitize <script> tags, the filtering can be bypassed by manipulating the raw HTTP POST request before submission. As a result, arbitrary JavaScript can be stored in the CMS content and executed whenever the page is viewed or edited. This exposes administrators to a high-severity risk, including complete account takeover, …

2025

bagisto has Server Side Template Injection (SSTI) in Product Description

Bagisto v2.3.7 is vulnerable to Server-Side Template Injection (SSTI) due to unsanitized user input being processed by the server-side templating engine when rendering product descriptions. This allows an attacker with product creation privileges to inject arbitrary template expressions that are evaluated by the backend — potentially leading to Remote Code Execution (RCE) on the server.

bagisto has CSV Formula Injection in Create New Product

When product data that begins with a spreadsheet formula character (for example =, +, -, or @) is accepted and later exported or saved into a CSV and opened in spreadsheet software, the spreadsheet will interpret that cell as a formula. This allows an attacker to supply a CSV field (e.g., product name) that contains a formula which may be evaluated by a victim’s spreadsheet application — potentially leading to …

bagisto has Cross Site Scripting (XSS) in Create New Customer

In Bagisto v2.3.7, the “Create New Customer” feature (in the admin panel) is vulnerable to reflected / stored Cross-Site Scripting (XSS). An attacker with access to the admin create-customer form can inject malicious JavaScript payloads into certain input fields. These payloads may later execute in the context of an admin’s browser or another user viewing the customer data, enabling session theft or admin-level actions.

Bagisto is vulnerable to XSS through Admin Panel's product creation path

An authenticated stored XSS vulnerability exists in the Bagisto 2.3.6 admin panel's product creation path, allowing an attacker to upload a crafted SVG file containing malicious JavaScript code. This vulnerability can be exploited by an authenticated admin user to execute arbitrary JavaScript in the browser, potentially leading to session hijacking, data theft, or unauthorized actions.

2024
2023
2019