CVE-2026-30777
Received Received - Intake
MFA Bypass in EC-CUBE Allows Unauthorized Admin Access

Publication date: 2026-03-05

Last updated on: 2026-03-09

Assigner: JPCERT/CC

Description
EC-CUBE provided by EC-CUBE CO.,LTD. contains a multi-factor authentication (MFA) bypass vulnerability. An attacker who has obtained a valid administrator ID and password may be able to bypass two-factor authentication and gain unauthorized access to the administrative page.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-05
Last Modified
2026-03-09
Generated
2026-05-07
AI Q&A
2026-03-05
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 11 associated CPEs
Vendor Product Version / Range
ec-cube ec-cube 4.1.2
ec-cube ec-cube 4.1.2
ec-cube ec-cube From 4.1.0 (inc) to 4.1.2 (exc)
ec-cube ec-cube From 4.2.0 (inc) to 4.2.3 (exc)
ec-cube ec-cube From 4.3.0 (inc) to 4.3.1 (exc)
ec-cube ec-cube 4.1.2
ec-cube ec-cube 4.1.2
ec-cube ec-cube 4.1.2
ec-cube ec-cube 4.2.3
ec-cube ec-cube 4.2.3
ec-cube ec-cube 4.3.1
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-288 The product requires authentication, but the product has an alternate path or channel that does not require authentication.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-30777 is a vulnerability in EC-CUBE, an e-commerce platform, that allows an attacker to bypass multi-factor authentication (MFA). Specifically, if an attacker obtains a valid administrator ID and password, they can circumvent the two-factor authentication mechanism and gain unauthorized access to the administrative page.

The issue arises because the system does not properly enforce 2FA checks on certain routes, allowing an attacker with valid credentials to bypass the second authentication factor.


How can this vulnerability impact me? :

If exploited, this vulnerability allows an attacker who has obtained valid administrator credentials to bypass the multi-factor authentication and gain unauthorized access to the administrative panel of EC-CUBE.

This unauthorized access could lead to administrative control over the e-commerce platform, potentially allowing the attacker to manipulate settings, access sensitive data, or disrupt operations.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

I don't know


What immediate steps should I take to mitigate this vulnerability?

To mitigate the MFA bypass vulnerability in EC-CUBE, you should apply the provided patch files corresponding to your EC-CUBE version. The patches update key files to properly enforce two-factor authentication checks and prevent bypass.

  • Backup all EC-CUBE files before applying patches.
  • Apply the patch matching your EC-CUBE version: 4.1.2-p5, 4.2.3-p2, or 4.3.1-p1.
  • Clear the cache via the admin panel after patching.
  • Verify normal operation of both front-end and admin interfaces.
  • Use maintenance mode during patching to avoid service disruption.

If you are using older versions or have customized EC-CUBE files, manually apply the provided code differences to enforce proper 2FA checks and prevent bypass.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart