prestashop CVE Vulnerabilities & Metrics

Focus on prestashop vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About prestashop Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with prestashop. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total prestashop CVEs: 101
Earliest CVE date: 31 Dec 2008, 11:30 UTC
Latest CVE date: 12 Aug 2024, 17:15 UTC

Latest CVE reference: CVE-2024-41651

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 3

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): -88.89%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): -88.89%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical prestashop CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 3.72

Max CVSS: 10.0

Critical CVEs (≥9): 3

CVSS Range vs. Count

Range Count
0.0-3.9 46
4.0-6.9 49
7.0-8.9 12
9.0-10.0 3

CVSS Distribution Chart

Top 5 Highest CVSS prestashop CVEs

These are the five CVEs with the highest CVSS scores for prestashop, sorted by severity first and recency.

All CVEs for prestashop

CVE-2024-41651 prestashop vulnerability CVSS: 0 12 Aug 2024, 17:15 UTC

An issue in Prestashop v.8.1.7 and before allows a remote attacker to execute arbitrary code via the module upgrade functionality. NOTE: this is disputed by multiple parties, who report that exploitation requires that an attacker be able to hijack network requests made by an admin user (who, by design, is allowed to change the code that is running on the server).

CVE-2024-34717 prestashop vulnerability CVSS: 0 14 May 2024, 16:17 UTC

PrestaShop is an open source e-commerce web application. In PrestaShop 8.1.5, any invoice can be downloaded from front-office in anonymous mode, by supplying a random secure_key parameter in the url. This issue is patched in version 8.1.6. No known workarounds are available.

CVE-2024-34716 prestashop vulnerability CVSS: 0 14 May 2024, 16:17 UTC

PrestaShop is an open source e-commerce web application. A cross-site scripting (XSS) vulnerability that only affects PrestaShops with customer-thread feature flag enabled is present starting from PrestaShop 8.1.0 and prior to PrestaShop 8.1.6. When the customer thread feature flag is enabled through the front-office contact form, a hacker can upload a malicious file containing an XSS that will be executed when an admin opens the attached file in back office. The script injected can access the session and the security token, which allows it to perform any authenticated action in the scope of the administrator's right. This vulnerability is patched in 8.1.6. A workaround is to disable the customer-thread feature-flag.

CVE-2024-26129 prestashop vulnerability CVSS: 0 19 Feb 2024, 22:15 UTC

PrestaShop is an open-source e-commerce platform. Starting in version 8.1.0 and prior to version 8.1.4, PrestaShop is vulnerable to path disclosure in a JavaScript variable. A patch is available in version 8.1.4.

CVE-2024-21628 prestashop vulnerability CVSS: 0 02 Jan 2024, 22:15 UTC

PrestaShop is an open-source e-commerce platform. Prior to version 8.1.3, the isCleanHtml method is not used on this this form, which makes it possible to store a cross-site scripting payload in the database. The impact is low because the HTML is not interpreted in BO, thanks to twig's escape mechanism. In FO, the cross-site scripting attack is effective, but only impacts the customer sending it, or the customer session from which it was sent. This issue affects those who have a module fetching these messages from the DB and displaying it without escaping HTML. Version 8.1.3 contains a patch for this issue.

CVE-2024-21627 prestashop vulnerability CVSS: 0 02 Jan 2024, 21:15 UTC

PrestaShop is an open-source e-commerce platform. Prior to versions 8.1.3 and 1.7.8.11, some event attributes are not detected by the `isCleanHTML` method. Some modules using the `isCleanHTML` method could be vulnerable to cross-site scripting. Versions 8.1.3 and 1.7.8.11 contain a patch for this issue. The best workaround is to use the `HTMLPurifier` library to sanitize html input coming from users. The library is already available as a dependency in the PrestaShop project. Beware though that in legacy object models, fields of `HTML` type will call `isCleanHTML`.

CVE-2023-47110 prestashop vulnerability CVSS: 0 09 Nov 2023, 16:15 UTC

blockreassurance adds an information block aimed at offering helpful information to reassure customers that their store is trustworthy. An ajax function in module blockreassurance allows modifying any value in the configuration table. This vulnerability has been patched in version 5.1.4.

CVE-2023-47109 prestashop vulnerability CVSS: 0 08 Nov 2023, 22:15 UTC

PrestaShop blockreassurance adds an information block aimed at offering helpful information to reassure customers that the store is trustworthy. When adding a block in blockreassurance module, a BO user can modify the http request and give the path of any file in the project instead of an image. When deleting the block from the BO, the file will be deleted. It is possible to make the website completely unavailable by removing index.php for example. This issue has been patched in version 5.1.4.

CVE-2023-36263 prestashop vulnerability CVSS: 0 31 Oct 2023, 05:15 UTC

Prestashop opartlimitquantity 1.4.5 and before is vulnerable to SQL Injection. OpartlimitquantityAlertlimitModuleFrontController::displayAjaxPushAlertMessage()` has sensitive SQL calls that can be executed with a trivial http call and exploited to forge a SQL injection.

CVE-2023-43664 prestashop vulnerability CVSS: 0 28 Sep 2023, 19:15 UTC

PrestaShop is an Open Source e-commerce web application. In the Prestashop Back office interface, an employee can list all modules without any access rights: method `ajaxProcessGetPossibleHookingListForModule` doesn't check access rights. This issue has been addressed in commit `15bd281c` which is included in version 8.1.2. Users are advised to upgrade. There are no known workaround for this issue.

CVE-2023-43663 prestashop vulnerability CVSS: 0 28 Sep 2023, 19:15 UTC

PrestaShop is an Open Source e-commerce web application. In affected versions any module can be disabled or uninstalled from back office, even with low user right. This allows low privileged users to disable portions of a shops functionality. Commit `ce1f6708` addresses this issue and is included in version 8.1.2. Users are advised to upgrade. There are no known workarounds for this issue.

CVE-2022-45448 prestashop vulnerability CVSS: 0 20 Sep 2023, 13:15 UTC

M4 PDF plugin for Prestashop sites, in its 3.2.3 version and before, is vulnerable to an arbitrary HTML Document crafting vulnerability. The resource /m4pdf/pdf.php uses templates to dynamically create documents. In the case that the template does not exist, the application will return a fixed document with a message in mpdf format. An attacker could exploit this vulnerability by inputting a valid HTML/CSS document as the value of the parameter.

CVE-2022-45447 prestashop vulnerability CVSS: 0 20 Sep 2023, 10:15 UTC

M4 PDF plugin for Prestashop sites, in its 3.2.3 version and before, is vulnerable to a directory traversal vulnerability. The “f” parameter is not properly checked in the resource /m4pdf/pdf.php, returning any file given its relative path. An attacker that exploits this vulnerability could download /etc/passwd from the server if the file exists.

CVE-2023-39530 prestashop vulnerability CVSS: 0 07 Aug 2023, 21:15 UTC

PrestaShop is an open source e-commerce web application. Prior to version 8.1.1, it is possible to delete files from the server via the CustomerMessage API. Version 8.1.1 contains a patch for this issue. There are no known workarounds.

CVE-2023-39529 prestashop vulnerability CVSS: 0 07 Aug 2023, 21:15 UTC

PrestaShop is an open source e-commerce web application. Prior to version 8.1.1, it is possible to delete a file from the server by using the Attachments controller and the Attachments API. Version 8.1.1 contains a patch for this issue. There are no known workarounds.

CVE-2023-39528 prestashop vulnerability CVSS: 0 07 Aug 2023, 21:15 UTC

PrestaShop is an open source e-commerce web application. Prior to version 8.1.1, the `displayAjaxEmailHTML` method can be used to read any file on the server, potentially even outside of the project if the server is not correctly configured. Version 8.1.1 contains a patch for this issue. There are no known workarounds.

CVE-2023-39527 prestashop vulnerability CVSS: 0 07 Aug 2023, 21:15 UTC

PrestaShop is an open source e-commerce web application. Versions prior to 1.7.8.10, 8.0.5, and 8.1.1 are vulnerable to cross-site scripting through the `isCleanHTML` method. Versions 1.7.8.10, 8.0.5, and 8.1.1 contain a patch. There are no known workarounds.

CVE-2023-39526 prestashop vulnerability CVSS: 0 07 Aug 2023, 21:15 UTC

PrestaShop is an open source e-commerce web application. Versions prior to 1.7.8.10, 8.0.5, and 8.1.1 are vulnerable to remote code execution through SQL injection and arbitrary file write in the back office. Versions 1.7.8.10, 8.0.5, and 8.1.1 contain a patch. There are no known workarounds.

CVE-2023-39525 prestashop vulnerability CVSS: 0 07 Aug 2023, 21:15 UTC

PrestaShop is an open source e-commerce web application. Prior to version 8.1.1, in the back office, files can be compromised using path traversal by replaying the import file deletion query with a specified file path that uses the traversal path. Version 8.1.1 contains a patch for this issue. There are no known workarounds.

CVE-2023-39524 prestashop vulnerability CVSS: 0 07 Aug 2023, 20:15 UTC

PrestaShop is an open source e-commerce web application. Prior to version 8.1.1, SQL injection possible in the product search field, in BO's product page. Version 8.1.1 contains a patch for this issue. There are no known workarounds.

CVE-2023-30153 prestashop vulnerability CVSS: 0 18 Jul 2023, 19:15 UTC

An SQL injection vulnerability in the Payplug (payplug) module for PrestaShop, in versions 3.6.0, 3.6.1, 3.6.2, 3.6.3, 3.7.0 and 3.7.1, allows remote attackers to execute arbitrary SQL commands via the ajax.php front controller.

CVE-2023-30151 prestashop vulnerability CVSS: 0 13 Jul 2023, 17:15 UTC

A SQL injection vulnerability in the Boxtal (envoimoinscher) module for PrestaShop, after version 3.1.10, allows remote attackers to execute arbitrary SQL commands via the `key` GET parameter.

CVE-2023-31672 prestashop vulnerability CVSS: 0 15 Jun 2023, 20:15 UTC

In the PrestaShop < 2.4.3 module "Length, weight or volume sell" (ailinear) there is a SQL injection vulnerability.

CVE-2023-30192 prestashop vulnerability CVSS: 0 12 May 2023, 00:15 UTC

Prestashop possearchproducts 1.7 is vulnerable to SQL Injection via PosSearch::find().

CVE-2023-30839 prestashop vulnerability CVSS: 0 25 Apr 2023, 19:15 UTC

PrestaShop is an Open Source e-commerce web application. Versions prior to 8.0.4 and 1.7.8.9 contain a SQL filtering vulnerability. A BO user can write, update, and delete in the database, even without having specific rights. PrestaShop 8.0.4 and 1.7.8.9 contain a patch for this issue. There are no known workarounds.

CVE-2023-30838 prestashop vulnerability CVSS: 0 25 Apr 2023, 19:15 UTC

PrestaShop is an Open Source e-commerce web application. Prior to versions 8.0.4 and 1.7.8.9, the `ValidateCore::isCleanHTML()` method of Prestashop misses hijackable events which can lead to cross-site scripting (XSS) injection, allowed by the presence of pre-setup `@keyframes` methods. This XSS, which hijacks HTML attributes, can be triggered without any interaction by the visitor/administrator, which makes it as dangerous as a trivial XSS attack. Contrary to other attacks which target HTML attributes and are triggered without user interaction (such as onload / onerror which suffer from a very limited scope), this one can hijack every HTML element, which increases the danger due to a complete HTML elements scope. Versions 8.0.4 and 1.7.8.9 contain a fix for this issue.

CVE-2023-30545 prestashop vulnerability CVSS: 0 25 Apr 2023, 18:15 UTC

PrestaShop is an Open Source e-commerce web application. Prior to versions 8.0.4 and 1.7.8.9, it is possible for a user with access to the SQL Manager (Advanced Options -> Database) to arbitrarily read any file on the operating system when using SQL function `LOAD_FILE` in a `SELECT` request. This gives the user access to critical information. A patch is available in PrestaShop 8.0.4 and PS 1.7.8.9

CVE-2023-25206 prestashop vulnerability CVSS: 0 14 Mar 2023, 17:15 UTC

PrestaShop ws_productreviews < 3.6.2 is vulnerable to SQL Injection.

CVE-2023-25207 prestashop vulnerability CVSS: 0 13 Mar 2023, 20:15 UTC

PrestaShop dpdfrance <6.1.3 is vulnerable to SQL Injection via dpdfrance/ajax.php.

CVE-2023-25170 prestashop vulnerability CVSS: 0 13 Mar 2023, 17:15 UTC

PrestaShop is an open source e-commerce web application that, prior to version 8.0.1, is vulnerable to cross-site request forgery (CSRF). When authenticating users, PrestaShop preserves session attributes. Because this does not clear CSRF tokens upon login, this might enable same-site attackers to bypass the CSRF protection mechanism by performing an attack similar to a session-fixation. The problem is fixed in version 8.0.1.

CVE-2023-24763 prestashop vulnerability CVSS: 0 06 Mar 2023, 20:15 UTC

In the module "Xen Forum" (xenforum) for PrestaShop, an authenticated user can perform SQL injection in versions up to 2.13.0.

CVE-2022-46158 prestashop vulnerability CVSS: 0 08 Dec 2022, 22:15 UTC

PrestaShop is an open-source e-commerce solution. Versions prior to 1.7.8.8 did not properly restrict host filesystem access for users. Users may have been able to view the contents of the upload directory without appropriate permissions. This issue has been addressed and users are advised to upgrade to version 1.7.8.8. There are no known workarounds for this issue.

CVE-2022-35933 prestashop vulnerability CVSS: 0 02 Sep 2022, 20:15 UTC

This package is a PrestaShop module that allows users to post reviews and rate products. There is a vulnerability where the attacker could steal an administrator's cookie. The issue is fixed in version 5.0.2.

CVE-2022-31181 prestashop vulnerability CVSS: 0 01 Aug 2022, 20:15 UTC

PrestaShop is an Open Source e-commerce platform. In versions from 1.6.0.10 and before 1.7.8.7 PrestaShop is subject to an SQL injection vulnerability which can be chained to call PHP's Eval function on attacker input. The problem is fixed in version 1.7.8.7. Users are advised to upgrade. Users unable to upgrade may delete the MySQL Smarty cache feature.

CVE-2020-21967 prestashop vulnerability CVSS: 3.5 13 Jul 2022, 20:15 UTC

File upload vulnerability in the Catalog feature in Prestashop 1.7.6.7 allows remote attackers to run arbitrary code via the add new file page.

CVE-2022-31101 prestashop vulnerability CVSS: 6.5 27 Jun 2022, 23:15 UTC

prestashop/blockwishlist is a prestashop extension which adds a block containing the customer's wishlists. In affected versions an authenticated customer can perform SQL injection. This issue is fixed in version 2.1.1. Users are advised to upgrade. There are no known workarounds for this issue.

CVE-2022-21686 prestashop vulnerability CVSS: 7.5 26 Jan 2022, 20:15 UTC

PrestaShop is an Open Source e-commerce platform. Starting with version 1.7.0.0 and ending with version 1.7.8.3, an attacker is able to inject twig code inside the back office when using the legacy layout. The problem is fixed in version 1.7.8.3. There are no known workarounds.

CVE-2012-20001 prestashop vulnerability CVSS: 4.3 21 Dec 2021, 16:15 UTC

PrestaShop before 1.5.2 allows XSS via the "<object data='data:text/html" substring in the message field.

CVE-2021-43789 prestashop vulnerability CVSS: 7.5 07 Dec 2021, 17:15 UTC

PrestaShop is an Open Source e-commerce web application. Versions of PrestaShop prior to 1.7.8.2 are vulnerable to blind SQL injection using search filters with `orderBy` and `sortOrder` parameters. The problem is fixed in version 1.7.8.2.

CVE-2021-21418 prestashop vulnerability CVSS: 3.5 31 Mar 2021, 18:15 UTC

ps_emailsubscription is a newsletter subscription module for the PrestaShop platform. An employee can inject javascript in the newsletter condition field that will then be executed on the front office The issue has been fixed in 2.6.1

CVE-2021-21398 prestashop vulnerability CVSS: 3.5 30 Mar 2021, 16:15 UTC

PrestaShop is a fully scalable open source e-commerce solution. In PrestaShop before version 1.7.7.3, an attacker can inject HTML when the Grid Column Type DataColumn is badly used. The problem is fixed in 1.7.7.3

CVE-2021-21308 prestashop vulnerability CVSS: 6.4 26 Feb 2021, 20:15 UTC

PrestaShop is a fully scalable open source e-commerce solution. In PrestaShop before version 1.7.2 the soft logout system is not complete and an attacker is able to foreign request and executes customer commands. The problem is fixed in 1.7.7.2

CVE-2021-21302 prestashop vulnerability CVSS: 6.5 26 Feb 2021, 20:15 UTC

PrestaShop is a fully scalable open source e-commerce solution. In PrestaShop before version 1.7.2 there is a CSV Injection vulnerability possible by using shop search keywords via the admin panel. The problem is fixed in 1.7.7.2

CVE-2021-3110 prestashop vulnerability CVSS: 7.5 20 Jan 2021, 13:15 UTC

The store system in PrestaShop 1.7.7.0 allows time-based boolean SQL injection via the module=productcomments controller=CommentGrade id_products[] parameter.

CVE-2020-26248 prestashop vulnerability CVSS: 6.4 03 Dec 2020, 21:15 UTC

In the PrestaShop module "productcomments" before version 4.2.1, an attacker can use a Blind SQL injection to retrieve data or stop the MySQL service. The problem is fixed in 4.2.1 of the module.

CVE-2020-26225 prestashop vulnerability CVSS: 4.3 16 Nov 2020, 22:15 UTC

In PrestaShop Product Comments before version 4.2.0, an attacker could inject malicious web code into the users' web browsers by creating a malicious link. The problem was introduced in version 4.0.0 and is fixed in 4.2.0

CVE-2020-26224 prestashop vulnerability CVSS: 5.0 16 Nov 2020, 22:15 UTC

In PrestaShop before version 1.7.6.9 an attacker is able to list all the orders placed on the website without being logged by abusing the function that allows a shopping cart to be recreated from an order already placed. The problem is fixed in 1.7.6.9.

CVE-2020-15162 prestashop vulnerability CVSS: 3.5 24 Sep 2020, 23:15 UTC

In PrestaShop from version 1.5.0.0 and before version 1.7.6.8, users are allowed to send compromised files. These attachments allowed people to input malicious JavaScript which triggered an XSS payload. The problem is fixed in version 1.7.6.8.

CVE-2020-15160 prestashop vulnerability CVSS: 7.5 24 Sep 2020, 23:15 UTC

PrestaShop from version 1.7.5.0 and before version 1.7.6.8 is vulnerable to a blind SQL Injection attack in the Catalog Product edition page with location parameter. The problem is fixed in 1.7.6.8

CVE-2020-15161 prestashop vulnerability CVSS: 4.3 24 Sep 2020, 22:15 UTC

In PrestaShop from version 1.6.0.4 and before version 1.7.6.8 an attacker is able to inject javascript while using the contact form. The problem is fixed in 1.7.6.8

CVE-2020-15178 prestashop vulnerability CVSS: 4.3 15 Sep 2020, 18:15 UTC

In PrestaShop contactform module (prestashop/contactform) before version 4.3.0, an attacker is able to inject JavaScript while using the contact form. The `message` field was incorrectly unescaped, possibly allowing attackers to execute arbitrary JavaScript in a victim's browser.

CVE-2020-15102 prestashop vulnerability CVSS: 4.0 21 Jul 2020, 18:15 UTC

In PrestaShop Dashboard Productions before version 2.1.0, there is improper authorization which enables an attacker to change the configuration. The problem is fixed in 2.1.0.

CVE-2020-4074 prestashop vulnerability CVSS: 10.0 02 Jul 2020, 17:15 UTC

In PrestaShop from version 1.5.0.0 and before version 1.7.6.6, the authentication system is malformed and an attacker is able to forge requests and execute admin commands. The problem is fixed in 1.7.6.6.

CVE-2020-15083 prestashop vulnerability CVSS: 4.3 02 Jul 2020, 17:15 UTC

In PrestaShop from version 1.7.0.0 and before version 1.7.6.6, if a target sends a corrupted file, it leads to a reflected XSS. The problem is fixed in 1.7.6.6

CVE-2020-15082 prestashop vulnerability CVSS: 7.5 02 Jul 2020, 17:15 UTC

In PrestaShop from version 1.6.0.1 and before version 1.7.6.6, the dashboard allows rewriting all configuration variables. The problem is fixed in 1.7.6.6

CVE-2020-15081 prestashop vulnerability CVSS: 5.0 02 Jul 2020, 17:15 UTC

In PrestaShop from version 1.5.0.0 and before 1.7.6.6, there is information exposure in the upload directory. The problem is fixed in version 1.7.6.6. A possible workaround is to add an empty index.php file in the upload directory.

CVE-2020-15080 prestashop vulnerability CVSS: 5.0 02 Jul 2020, 17:15 UTC

In PrestaShop from version 1.7.4.0 and before version 1.7.6.6, some files should not be in the release archive, and others should not be accessible. The problem is fixed in version 1.7.6.6 A possible workaround is to make sure `composer.json` and `docker-compose.yml` are not accessible on your server.

CVE-2020-15079 prestashop vulnerability CVSS: 5.5 02 Jul 2020, 17:15 UTC

In PrestaShop from version 1.5.0.0 and before version 1.7.6.6, there is improper access control in Carrier page, Module Manager and Module Positions. The problem is fixed in version 1.7.6.6

CVE-2020-11074 prestashop vulnerability CVSS: 3.5 02 Jul 2020, 17:15 UTC

In PrestaShop from version 1.5.3.0 and before version 1.7.6.6, there is a stored XSS when using the name of a quick access item. The problem is fixed in 1.7.6.6.

CVE-2020-12120 prestashop vulnerability CVSS: 5.0 27 Apr 2020, 15:15 UTC

The Correos Express addon for PrestaShop 1.6 through 1.7 allows remote attackers to obtain sensitive information, such as a service's owner password that can be used to modify orders via SOAP. Attackers can also retrieve information about orders or buyers.

CVE-2020-5293 prestashop vulnerability CVSS: 6.4 20 Apr 2020, 17:15 UTC

In PrestaShop between versions 1.7.0.0 and 1.7.6.5, there are improper access controls on product page with combinations, attachments and specific prices. The problem is fixed in 1.7.6.5.

CVE-2020-5288 prestashop vulnerability CVSS: 6.4 20 Apr 2020, 17:15 UTC

"In PrestaShop between versions 1.7.0.0 and 1.7.6.5, there is improper access controls on product attributes page. The problem is fixed in 1.7.6.5.

CVE-2020-5287 prestashop vulnerability CVSS: 6.4 20 Apr 2020, 17:15 UTC

In PrestaShop between versions 1.5.5.0 and 1.7.6.5, there is improper access control on customers search. The problem is fixed in 1.7.6.5.

CVE-2020-5286 prestashop vulnerability CVSS: 4.3 20 Apr 2020, 17:15 UTC

In PrestaShop between versions 1.7.4.0 and 1.7.6.5, there is a reflected XSS when uploading a wrong file. The problem is fixed in 1.7.6.5

CVE-2020-5285 prestashop vulnerability CVSS: 4.3 20 Apr 2020, 17:15 UTC

In PrestaShop between versions 1.7.6.0 and 1.7.6.5, there is a reflected XSS with `back` parameter. The problem is fixed in 1.7.6.5

CVE-2020-5279 prestashop vulnerability CVSS: 6.4 20 Apr 2020, 17:15 UTC

In PrestaShop between versions 1.5.0.0 and 1.7.6.5, there are improper access control since the the version 1.5.0.0 for legacy controllers. - admin-dev/index.php/configure/shop/customer-preferences/ - admin-dev/index.php/improve/international/translations/ - admin-dev/index.php/improve/international/geolocation/ - admin-dev/index.php/improve/international/localization - admin-dev/index.php/configure/advanced/performance - admin-dev/index.php/sell/orders/delivery-slips/ - admin-dev/index.php?controller=AdminStatuses The problem is fixed in 1.7.6.5

CVE-2020-5278 prestashop vulnerability CVSS: 4.3 20 Apr 2020, 17:15 UTC

In PrestaShop between versions 1.5.4.0 and 1.7.6.5, there is a reflected XSS on Exception page The problem is fixed in 1.7.6.5

CVE-2020-5276 prestashop vulnerability CVSS: 4.3 20 Apr 2020, 17:15 UTC

In PrestaShop between versions 1.7.1.0 and 1.7.6.5, there is a reflected XSS on AdminCarts page with `cartBox` parameter The problem is fixed in 1.7.6.5

CVE-2020-5272 prestashop vulnerability CVSS: 4.3 20 Apr 2020, 17:15 UTC

In PrestaShop between versions 1.5.5.0 and 1.7.6.5, there is a reflected XSS on Search page with `alias` and `search` parameters. The problem is patched in 1.7.6.5

CVE-2020-5271 prestashop vulnerability CVSS: 4.3 20 Apr 2020, 17:15 UTC

In PrestaShop between versions 1.6.0.0 and 1.7.6.5, there is a reflected XSS with `date_from` and `date_to` parameters in the dashboard page This problem is fixed in 1.7.6.5

CVE-2020-5270 prestashop vulnerability CVSS: 5.8 20 Apr 2020, 17:15 UTC

In PrestaShop between versions 1.7.6.0 and 1.7.6.5, there is an open redirection when using back parameter. The impacts can be many, and vary from the theft of information and credentials to the redirection to malicious websites containing attacker-controlled content, which in some cases even cause XSS attacks. So even though an open redirection might sound harmless at first, the impacts of it can be severe should it be exploitable. The problem is fixed in 1.7.6.5

CVE-2020-5269 prestashop vulnerability CVSS: 4.3 20 Apr 2020, 17:15 UTC

In PrestaShop between versions 1.7.6.1 and 1.7.6.5, there is a reflected XSS on AdminFeatures page by using the `id_feature` parameter. The problem is fixed in 1.7.6.5

CVE-2020-5265 prestashop vulnerability CVSS: 4.3 20 Apr 2020, 17:15 UTC

In PrestaShop between versions 1.7.6.1 and 1.7.6.5, there is a reflected XSS on AdminAttributesGroups page. The problem is patched in 1.7.6.5.

CVE-2020-5264 prestashop vulnerability CVSS: 4.3 20 Apr 2020, 17:15 UTC

In PrestaShop before version 1.7.6.5, there is a reflected XSS while running the security compromised page. It allows anyone to execute arbitrary action. The problem is patched in the 1.7.6.5.

CVE-2020-5294 prestashop vulnerability CVSS: 3.5 16 Apr 2020, 22:15 UTC

PrestaShop module ps_facetedsearch versions before 2.1.0 has a reflected XSS with social networks fields The problem is fixed in 2.1.0

CVE-2020-5273 prestashop vulnerability CVSS: 3.5 16 Apr 2020, 22:15 UTC

In PrestaShop module ps_linklist versions before 3.1.0, there is a stored XSS when using custom URLs. The problem is fixed in version 3.1.0

CVE-2020-5266 prestashop vulnerability CVSS: 3.5 16 Apr 2020, 22:15 UTC

In the ps_link module for PrestaShop before version 3.1.0, there is a stored XSS when you create or edit a link list block with the title field. The problem is fixed in 3.1.0

CVE-2020-5277 prestashop vulnerability CVSS: 3.5 25 Mar 2020, 19:15 UTC

PrestaShop module ps_facetedsearch versions before 3.5.0 has a reflected XSS with `url_name` parameter. The problem is fixed in 3.5.0

CVE-2020-5250 prestashop vulnerability CVSS: 4.9 05 Mar 2020, 17:15 UTC

In PrestaShop before version 1.7.6.4, when a customer edits their address, they can freely change the id_address in the form, and thus steal someone else's address. It is the same with CustomerForm, you are able to change the id_customer and change all information of all accounts. The problem is patched in version 1.7.6.4.

CVE-2013-6295 prestashop vulnerability CVSS: 7.5 18 Feb 2020, 17:15 UTC

PrestaShop 1.5.5 vulnerable to privilege escalation via a Salesman account via upload module

CVE-2013-4792 prestashop vulnerability CVSS: 3.5 14 Feb 2020, 00:15 UTC

PrestaShop before 1.4.11 allows logout CSRF.

CVE-2013-4791 prestashop vulnerability CVSS: 3.5 14 Feb 2020, 00:15 UTC

PrestaShop before 1.4.11 allows Logistician, translators and other low level profiles/accounts to inject a persistent XSS vector on TinyMCE.

CVE-2012-2517 prestashop vulnerability CVSS: 4.3 11 Feb 2020, 20:15 UTC

Cross-site scripting (XSS) vulnerability in PrestaShop before 1.4.9 allows remote attackers to inject arbitrary web script or HTML via the index of the product[] parameter to ajax.php.

CVE-2013-6358 prestashop vulnerability CVSS: 9.0 23 Jan 2020, 15:15 UTC

PrestaShop 1.5.5 allows remote authenticated attackers to execute arbitrary code by uploading a crafted profile and then accessing it in the module/ directory.

CVE-2020-6632 prestashop vulnerability CVSS: 4.3 09 Jan 2020, 02:15 UTC

In PrestaShop 1.7.6.2, XSS can occur during addition or removal of a QuickAccess link. This is related to AdminQuickAccessesController.php, themes/default/template/header.tpl, and themes/new-theme/js/header.js.

CVE-2019-19595 prestashop vulnerability CVSS: 7.5 05 Dec 2019, 16:15 UTC

reset/modules/advanced_form_maker_edit/multiupload/upload.php in the RESET.PRO Adobe Stock API integration 4.8 for PrestaShop allows remote attackers to execute arbitrary code by uploading a .php file.

CVE-2019-19594 prestashop vulnerability CVSS: 7.5 05 Dec 2019, 16:15 UTC

reset/modules/fotoliaFoto/multi_upload.php in the RESET.PRO Adobe Stock API Integration for PrestaShop 1.6 and 1.7 allows remote attackers to execute arbitrary code by uploading a .php file.

CVE-2019-13461 prestashop vulnerability CVSS: 5.0 09 Jul 2019, 18:15 UTC

In PrestaShop before 1.7.6.0 RC2, the id_address_delivery and id_address_invoice parameters are affected by an Insecure Direct Object Reference vulnerability due to a guessable value sent to the web application during checkout. An attacker could leak personal customer information. This is PrestaShop bug #14444.

CVE-2019-11876 prestashop vulnerability CVSS: 4.3 24 May 2019, 16:29 UTC

In PrestaShop 1.7.5.2, the shop_country parameter in the install/index.php installation script/component is affected by Reflected XSS. Exploitation by a malicious actor requires the user to follow the initial stages of the setup (accepting terms and conditions) before executing the malicious link.

CVE-2018-20717 prestashop vulnerability CVSS: 6.5 15 Jan 2019, 16:29 UTC

In the orders section of PrestaShop before 1.7.2.5, an attack is possible after gaining access to a target store with a user role with the rights of at least a Salesman or higher privileges. The attacker can then inject arbitrary PHP objects into the process and abuse an object chain in order to gain Remote Code Execution. This occurs because protection against serialized objects looks for a 0: followed by an integer, but does not consider 0:+ followed by an integer.

CVE-2018-19355 prestashop vulnerability CVSS: 7.5 19 Nov 2018, 00:29 UTC

modules/orderfiles/ajax/upload.php in the Customer Files Upload addon 2018-08-01 for PrestaShop (1.5 through 1.7) allows remote attackers to execute arbitrary code by uploading a php file via modules/orderfiles/upload.php with auptype equal to product (for upload destinations under modules/productfiles), order (for upload destinations under modules/files), or cart (for upload destinations under modules/cartfiles).

CVE-2018-19126 prestashop vulnerability CVSS: 7.5 09 Nov 2018, 11:29 UTC

PrestaShop 1.6.x before 1.6.1.23 and 1.7.x before 1.7.4.4 allows remote attackers to execute arbitrary code via a file upload.

CVE-2018-19125 prestashop vulnerability CVSS: 6.4 09 Nov 2018, 11:29 UTC

PrestaShop 1.6.x before 1.6.1.23 and 1.7.x before 1.7.4.4 allows remote attackers to delete an image directory.

CVE-2018-19124 prestashop vulnerability CVSS: 5.0 09 Nov 2018, 11:29 UTC

PrestaShop 1.6.x before 1.6.1.23 and 1.7.x before 1.7.4.4 on Windows allows remote attackers to write to arbitrary image files.

CVE-2018-13784 prestashop vulnerability CVSS: 6.4 09 Jul 2018, 10:29 UTC

PrestaShop before 1.6.1.20 and 1.7.x before 1.7.3.4 mishandles cookie encryption in Cookie.php, Rinjdael.php, and Blowfish.php.

CVE-2018-8824 prestashop vulnerability CVSS: 7.5 10 May 2018, 03:29 UTC

modules/bamegamenu/ajax_phpcode.php in the Responsive Mega Menu (Horizontal+Vertical+Dropdown) Pro module 1.0.32 for PrestaShop 1.5.5.0 through 1.7.2.5 allows remote attackers to execute a SQL Injection through function calls in the code parameter.

CVE-2018-8823 prestashop vulnerability CVSS: 7.5 28 Mar 2018, 02:29 UTC

modules/bamegamenu/ajax_phpcode.php in the Responsive Mega Menu (Horizontal+Vertical+Dropdown) Pro module 1.0.32 for PrestaShop 1.5.5.0 through 1.7.2.5 allows remote attackers to execute arbitrary PHP code via the code parameter.

CVE-2018-7491 prestashop vulnerability CVSS: 5.0 26 Feb 2018, 17:29 UTC

In PrestaShop through 1.7.2.5, a UI-Redressing/Clickjacking vulnerability was found that might lead to state-changing impact in the context of a user or an admin, because the generateHtaccess function in classes/Tools.php sets neither X-Frame-Options nor 'Content-Security-Policy "frame-ancestors' values.

CVE-2018-5682 prestashop vulnerability CVSS: 5.0 13 Jan 2018, 05:29 UTC

PrestaShop 1.7.2.4 allows user enumeration via the Reset Password feature, by noticing which reset attempts do not produce a "This account does not exist" error message.

CVE-2018-5681 prestashop vulnerability CVSS: 3.5 13 Jan 2018, 05:29 UTC

PrestaShop 1.7.2.4 has XSS via source-code editing on the "Pages > Edit page" screen.

CVE-2015-1175 prestashop vulnerability CVSS: 4.3 22 Jan 2015, 16:59 UTC

Cross-site scripting (XSS) vulnerability in blocklayered-ajax.php in the blocklayered module in PrestaShop 1.6.0.9 and earlier allows remote attackers to inject arbitrary web script or HTML via the layered_price_slider parameter.

CVE-2012-6641 prestashop vulnerability CVSS: 4.3 07 Apr 2014, 15:55 UTC

Cross-site scripting (XSS) vulnerability in redirect.php in the Socolissimo module (modules/socolissimo/) in PrestaShop before 1.4.7.2 allows remote attackers to inject arbitrary web script or HTML via vectors related to "parameter names and values."

CVE-2012-5801 prestashop vulnerability CVSS: 5.8 04 Nov 2012, 22:55 UTC

The PayPal module in PrestaShop does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate, related to use of the PHP fsockopen function.

CVE-2012-5800 prestashop vulnerability CVSS: 5.8 04 Nov 2012, 22:55 UTC

The eBay module in PrestaShop does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.

CVE-2012-5799 prestashop vulnerability CVSS: 5.8 04 Nov 2012, 22:55 UTC

The Canada Post (aka CanadaPost) module in PrestaShop does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate, related to use of the PHP fsockopen function.

CVE-2011-4545 prestashop vulnerability CVSS: 5.0 02 Dec 2011, 11:55 UTC

CRLF injection vulnerability in admin/displayImage.php in Prestashop 1.4.4.1 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via the name parameter.

CVE-2011-4544 prestashop vulnerability CVSS: 4.3 01 Dec 2011, 21:55 UTC

Multiple cross-site scripting (XSS) vulnerabilities in Prestashop before 1.5 allow remote attackers to inject arbitrary web script or HTML via the (1) address or (2) relativ_base_dir parameter to modules/mondialrelay/googlemap.php; the (3) relativ_base_dir, (4) Pays, (5) Ville, (6) CP, (7) Poids, (8) Action, or (9) num parameter to prestashop/modules/mondialrelay/googlemap.php; (10) the num_mode parameter to modules/mondialrelay/kit_mondialrelay/RechercheDetailPointRelais_ajax.php; (11) the Expedition parameter to modules/mondialrelay/kit_mondialrelay/SuiviExpedition_ajax.php; or the (12) folder or (13) name parameter to admin/ajaxfilemanager/ajax_save_text.php.

CVE-2011-3796 prestashop vulnerability CVSS: 5.0 24 Sep 2011, 00:55 UTC

PrestaShop 1.4.0.6 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by product-sort.php and certain other files.

CVE-2008-6503 prestashop vulnerability CVSS: 4.3 20 Mar 2009, 18:30 UTC

Multiple cross-site scripting (XSS) vulnerabilities in PrestaShop 1.1.0.3 allow remote attackers to inject arbitrary web script or HTML via the PATH_INFO to (1) admin/login.php and (2) order.php.

CVE-2008-5791 prestashop vulnerability CVSS: 10.0 31 Dec 2008, 11:30 UTC

Multiple unspecified vulnerabilities in PrestaShop e-Commerce Solution before 1.1 Beta 2 (aka 1.1.0.1) have unknown impact and attack vectors, related to the (1) bankwire module, (2) cheque module, and other components.