Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

999+ Articles
124+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. Security
  3. CVE-2026-44377: CubeCart Authenticated SSTI via Smarty Engine
CVE-2026-44377: CubeCart Authenticated SSTI via Smarty Engine

Critical Security Alert

This vulnerability is actively being exploited. Immediate action is recommended.

SECURITYCRITICALCVE-2026-44377

CVE-2026-44377: CubeCart Authenticated SSTI via Smarty Engine

An authenticated Server-Side Template Injection vulnerability in CubeCart prior to 6.7.0 allows attackers with API key access to execute arbitrary code through the Smarty template engine in Email Templates and Documents.

Dylan H.

Security Team

May 14, 2026
4 min read

Affected Products

  • CubeCart < 6.7.0

Executive Summary

A critical authenticated Server-Side Template Injection (SSTI) vulnerability has been disclosed in CubeCart, a widely used open-source e-commerce platform. Tracked as CVE-2026-44377 with a CVSS score of 9.1 (Critical), the flaw exists in multiple modules — including Email Templates and Documents — where user-supplied input is unsafely evaluated through the Smarty template engine. An authenticated attacker with API key access can achieve remote code execution on the underlying server.

Fixed in: CubeCart 6.7.0


Vulnerability Overview

Root Cause

The vulnerability arises because CubeCart passes user-controlled template content directly to the Smarty templating engine without sanitization or sandboxing. Smarty's template language supports function calls and PHP code execution in certain configurations, allowing an attacker to craft payloads that execute arbitrary system commands.

AttributeValue
CVE IDCVE-2026-44377
CVSS Score9.1 (Critical)
CWECWE-94 — Improper Control of Code Generation
TypeAuthenticated Server-Side Template Injection
Attack VectorNetwork
AuthenticationRequired (API key or admin session)
Privileges RequiredLow
User InteractionNone

Affected Components

  • Email Templates module
  • Documents module
  • Any other CubeCart module that passes user input to the Smarty renderer

Affected Versions

ProductAffectedFixed
CubeCart< 6.7.06.7.0

Technical Details

How SSTI Works in Smarty

Smarty templates support directives enclosed in { and } delimiters. Depending on the Smarty configuration ({php} tags, {fetch}, custom modifiers), attackers can escalate from template manipulation to OS command execution.

A typical SSTI payload targeting Smarty might look like:

{system('id')}

Or using the {fetch} directive to read arbitrary files, or chaining Smarty plugins for code execution. In CubeCart's default configuration, the Smarty security sandbox is insufficiently configured, allowing these payloads to evaluate.

Attack Scenario

  1. Attacker obtains an API key with write access (or gains authenticated admin access)
  2. Attacker navigates to Email Templates or Documents in the CubeCart admin panel
  3. A crafted Smarty payload is inserted into a template field
  4. When the template is rendered — either by triggering an email or previewing a document — the payload executes on the server
  5. Attacker achieves Remote Code Execution, potentially escalating to full server compromise

Impact Assessment

Severity Factors

  • CVSS 9.1 — Near-maximum critical rating
  • Code execution as the web server user, potentially root in misconfigured environments
  • Persistence — Attacker can write webshells or modify application files
  • Data exfiltration — Database credentials, customer PII, payment records accessible
  • Supply chain risk — E-commerce platforms have high-value targets (card data, credentials)

Who Is at Risk

Any organization running CubeCart prior to version 6.7.0 where:

  • Admin panel is accessible (even via internal network)
  • API keys have been issued with template editing permissions
  • Multi-tenant or managed hosting environments where users can edit templates

Remediation

Immediate Action

Upgrade to CubeCart 6.7.0 which disables or sandboxes the unsafe Smarty evaluation paths.

# Download and apply the 6.7.0 update via CubeCart admin
# Admin Panel > Store Settings > Check for Updates

If Immediate Patching Is Not Possible

  1. Restrict admin panel access to trusted IP ranges via firewall rules or .htaccess
  2. Audit API keys — Revoke any keys with templates:rw or broad write permissions
  3. Disable Email Template editing for non-administrator users
  4. Enable Smarty security mode manually in conf/config.inc.php if possible
  5. Monitor template edit events in application logs for unusual Smarty syntax

Smarty Security Hardening (Workaround)

In Smarty 4.x, security policies can be enforced:

$security = new Smarty_Security($smarty);
$security->php_functions = [];
$security->php_handling = Smarty::PHP_REMOVE;
$security->modifiers = [];
$smarty->enableSecurity($security);

Applying this configuration as a temporary measure can neutralize SSTI payloads until the patch is applied.


Detection

Log Indicators

Look for template content containing Smarty syntax payloads in HTTP request bodies:

{system(  {php}  {fetch file=  {$smarty.template_object

File Integrity

After patching, verify no webshells were dropped in the web root:

find /path/to/cubecart -name "*.php" -newer /path/to/cubecart/index.php

Key Takeaways

  1. CVSS 9.1 — Authenticated SSTI leading to Remote Code Execution
  2. Multiple modules affected — Email Templates and Documents at minimum
  3. Upgrade to CubeCart 6.7.0 immediately
  4. Restrict API key permissions while awaiting patch deployment
  5. Audit for compromise — Check for webshells and unauthorized file changes

References

  • NVD — CVE-2026-44377
  • CubeCart Security Advisory — 6.7.0 Release Notes
  • OWASP — Server-Side Template Injection
  • PortSwigger — SSTI Research
#CubeCart#CVE-2026-44377#SSTI#Smarty#RCE#E-Commerce

Related Articles

CVE-2026-45053: CubeCart REST API Arbitrary PHP File Upload RCE

A critical arbitrary file upload vulnerability in CubeCart's REST API File Manager allows holders of a files:rw API key to upload PHP webshells to the web root, enabling unauthenticated remote code execution post-upload.

5 min read

CVE-2026-34263 — SAP Commerce Cloud Unauthenticated RCE

A critical unauthenticated remote code execution vulnerability in SAP Commerce Cloud allows any unauthenticated user to upload malicious configurations and inject arbitrary code, resulting in full server-side code execution. CVSS 9.6.

7 min read

CVE-2026-41500: electerm macOS Command Injection via Install Script

A critical command injection vulnerability in the electerm terminal client allows remote attackers to achieve unauthenticated code execution on macOS...

3 min read
Back to all Security Alerts