Improper Validation of Specified Quantity in Input Affecting bagisto/bagisto package, versions <2.3.7


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept
EPSS
0.07% (22nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-PHP-BAGISTOBAGISTO-13545722
  • published14 Oct 2025
  • disclosed9 Oct 2025
  • creditRudransh Singh Rajpurohit

Introduced: 9 Oct 2025

NewCVE-2025-56426  (opens in a new tab)
CWE-1284  (opens in a new tab)

How to fix?

Upgrade bagisto/bagisto to version 2.3.7 or higher.

Overview

bagisto/bagisto is a hand tailored E-Commerce framework designed on some opensource technologies such as Laravel a PHP framework, Vue.js a progressive Javascript framework.

Affected versions of this package are vulnerable to Improper Validation of Specified Quantity in Input in the Cart/Checkout API endpoint due to improper validation of quantity inputs in the price calculation logic. An attacker can manipulate the price calculation logic by intercepting and tampering with HTTP requests.

CVSS Base Scores

version 4.0
version 3.1