[Japanese]

JVNDB-2026-000033

EC-CUBE vulnerable to multi-factor authentication bypass

Overview

EC-CUBE provided by EC-CUBE CO.,LTD. contains the following vulnerability.
  • Authentication bypass using an alternate path or channel (CWE-288) - CVE-2026-30777
EC-CUBE CO.,LTD. reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JPCERT/CC and EC-CUBE CO.,LTD. coordinated under the Information Security Early Warning Partnership.
CVSS Severity (What is CVSS?)

CVSS V3 Severity:
Base Metrics 4.9 (Medium) [IPA Score]
  • Attack Vector: Network
  • Attack Complexity: Low
  • Privileges Required: High
  • User Interaction: None
  • Scope: Unchanged
  • Confidentiality Impact: None
  • Integrity Impact: High
  • Availability Impact: None
CVSS v4 Severity
Base Metrics: 6.9 (Medium) [IPA Score]
  • Access Vector (AV): Network
  • Attack Complexity (AC): Low
  • Attack Requirements (AT): None
  • Privileges Required (PR): High
  • User Interaction (UI): None
  • Vulnerable System Impact
  • Confidentiality Impact (VC): None
  • Integrity Impact (VI): High
  • Availability Impact (VA): None
  • Subsequent System Impact
  • Confidentiality Impact (SC): None
  • Integrity Impact (SI): None
  • Availability Impact (SA): None
Affected Products


EC-CUBE CO.,LTD.
  • EC-CUBE 4.1 series versions prior to 4.1.2-p5
  • EC-CUBE 4.2 series versions prior to 4.2.3-p2
  • EC-CUBE 4.3 series versions prior to 4.3.1-p1

Impact

An attacker who has obtained a valid administrator ID and password may be able to bypass two-factor authentication and gain unauthorized access to the administrative page.
Solution

[Apply the patches]
Apply the appropriate patch according to the information provided by the developer.
Vendor Information

EC-CUBE CO.,LTD.
CWE (What is CWE?)

  1. No Mapping(CWE-Other) [IPA Evaluation]
CVE (What is CVE?)

  1. CVE-2026-30777
References

  1. JVN : JVN#63765888
Revision History

  • [2026/03/05]
      Web page was published