{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T07:23:44.275","vulnerabilities":[{"cve":{"id":"CVE-2026-21447","sourceIdentifier":"security-advisories@github.com","published":"2026-01-02T21:15:58.773","lastModified":"2026-01-08T21:24:08.743","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Bagisto is an open source laravel eCommerce platform. Prior to version 2.3.10, an Insecure Direct Object Reference vulnerability in the customer order reorder function allows any authenticated customer to add items from another customer's order to their own shopping cart by manipulating the order ID parameter. This exposes sensitive purchase information and enables potential fraud. Version 2.3.10 patches the issue."},{"lang":"es","value":"Bagisto es una plataforma de eCommerce laravel de código abierto. Antes de la versión 2.3.10, una vulnerabilidad de Referencia Directa a Objeto Insegura en la función de reordenar pedidos del cliente permite a cualquier cliente autenticado añadir artículos del pedido de otro cliente a su propio carrito de compras manipulando el parámetro de ID de pedido. Esto expone información de compra sensible y posibilita un fraude potencial. La versión 2.3.10 corrige el problema."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N","baseScore":7.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":4.2}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-284"},{"lang":"en","value":"CWE-639"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:webkul:bagisto:*:*:*:*:*:*:*:*","versionEndExcluding":"2.3.10","matchCriteriaId":"E9A19FD0-5100-48D6-BBB3-5A4CA1D90593"}]}]}],"references":[{"url":"https://github.com/bagisto/bagisto/commit/b2b1cf62577245d03a68532478cffbe321df74d3","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/bagisto/bagisto/security/advisories/GHSA-x5rw-qvvp-5cgm","source":"security-advisories@github.com","tags":["Exploit","Vendor Advisory"]}]}}]}