| 0 |
| url |
VCID-1trs-ajxn-jkhk |
| vulnerability_id |
VCID-1trs-ajxn-jkhk |
| summary |
Presta Shop vulnerable to email enumeration
### Impact
An unauthenticated attacker with access to the back-office URL can manipulate the id_employee and reset_token parameters to enumerate valid back-office employee email addresses.
Impacted parties:
Store administrators and employees: their email addresses are exposed.
Merchants: risk of phishing, social engineering, and brute-force attacks targeting admin accounts.
### Patches
PrestaShop 8.2.3
### Workarounds
You must upgrade, or at least apply the changes from the PrestaShop 8.2.3 patch. More information: https://build.prestashop-project.org/news/2025/prestashop-8-2-3-security-release/ |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-51586 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00765 |
| scoring_system |
epss |
| scoring_elements |
0.73399 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00765 |
| scoring_system |
epss |
| scoring_elements |
0.7344 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00765 |
| scoring_system |
epss |
| scoring_elements |
0.73448 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00765 |
| scoring_system |
epss |
| scoring_elements |
0.73468 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00765 |
| scoring_system |
epss |
| scoring_elements |
0.73444 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00765 |
| scoring_system |
epss |
| scoring_elements |
0.73431 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00765 |
| scoring_system |
epss |
| scoring_elements |
0.73394 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00765 |
| scoring_system |
epss |
| scoring_elements |
0.73422 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00972 |
| scoring_system |
epss |
| scoring_elements |
0.76688 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00972 |
| scoring_system |
epss |
| scoring_elements |
0.76684 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-51586 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
| reference_url |
https://prestashop.com |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
4.2 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N |
|
| 1 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://prestashop.com |
|
| 10 |
|
| 11 |
| reference_url |
https://prestashop.com/ |
| reference_id |
prestashop.com |
| reference_type |
|
| scores |
| 0 |
| value |
3.7 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N |
|
| 1 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-08T17:47:26Z/ |
|
|
| url |
https://prestashop.com/ |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-51586, GHSA-8xx5-h6m3-jr33
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1trs-ajxn-jkhk |
|
| 1 |
| url |
VCID-22v3-9qr1-pyfg |
| vulnerability_id |
VCID-22v3-9qr1-pyfg |
| summary |
PrestaShop file deletion via attachment API
PrestaShop is an open source e-commerce web application. Prior to version 8.1.1, it is possible to delete a file from the server by using the Attachments controller and the Attachments API. Version 8.1.1 contains a patch for this issue. There are no known workarounds. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-39529 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00691 |
| scoring_system |
epss |
| scoring_elements |
0.71837 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00691 |
| scoring_system |
epss |
| scoring_elements |
0.71757 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00691 |
| scoring_system |
epss |
| scoring_elements |
0.71776 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00691 |
| scoring_system |
epss |
| scoring_elements |
0.7175 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00691 |
| scoring_system |
epss |
| scoring_elements |
0.71789 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00691 |
| scoring_system |
epss |
| scoring_elements |
0.718 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00691 |
| scoring_system |
epss |
| scoring_elements |
0.71824 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00691 |
| scoring_system |
epss |
| scoring_elements |
0.71807 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00691 |
| scoring_system |
epss |
| scoring_elements |
0.71832 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-39529 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-39529, GHSA-2rf5-3fw8-qm47
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-22v3-9qr1-pyfg |
|
| 2 |
| url |
VCID-2kkx-8ucb-7ucj |
| vulnerability_id |
VCID-2kkx-8ucb-7ucj |
| summary |
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
PrestaShop is an Open Source e-commerce web application. Prior to versions 8.0.4 and 1.7.8.9, the `ValidateCore::isCleanHTML()` method of Prestashop misses hijackable events which can lead to cross-site scripting (XSS) injection, allowed by the presence of pre-setup `@keyframes` methods. This XSS, which hijacks HTML attributes, can be triggered without any interaction by the visitor/administrator, which makes it as dangerous as a trivial XSS attack. Contrary to other attacks which target HTML attributes and are triggered without user interaction (such as onload / onerror which suffer from a very limited scope), this one can hijack every HTML element, which increases the danger due to a complete HTML elements scope. Versions 8.0.4 and 1.7.8.9 contain a fix for this issue. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-30838 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00652 |
| scoring_system |
epss |
| scoring_elements |
0.70925 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00652 |
| scoring_system |
epss |
| scoring_elements |
0.70828 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00652 |
| scoring_system |
epss |
| scoring_elements |
0.70846 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00652 |
| scoring_system |
epss |
| scoring_elements |
0.7082 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00652 |
| scoring_system |
epss |
| scoring_elements |
0.70864 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00652 |
| scoring_system |
epss |
| scoring_elements |
0.7088 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00652 |
| scoring_system |
epss |
| scoring_elements |
0.70903 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00652 |
| scoring_system |
epss |
| scoring_elements |
0.70888 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00652 |
| scoring_system |
epss |
| scoring_elements |
0.70872 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00652 |
| scoring_system |
epss |
| scoring_elements |
0.70918 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-30838 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-30838, GHSA-fh7r-996q-gvcp
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2kkx-8ucb-7ucj |
|
| 3 |
| url |
VCID-45hk-m7uv-zqfe |
| vulnerability_id |
VCID-45hk-m7uv-zqfe |
| summary |
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
PrestaShop is an Open Source e-commerce web application. Prior to versions 8.0.4 and 1.7.8.9, it is possible for a user with access to the SQL Manager (Advanced Options -> Database) to arbitrarily read any file on the operating system when using SQL function `LOAD_FILE` in a `SELECT` request. This gives the user access to critical information. A patch is available in PrestaShop 8.0.4 and PS 1.7.8.9 |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-30545 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00565 |
| scoring_system |
epss |
| scoring_elements |
0.68485 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00565 |
| scoring_system |
epss |
| scoring_elements |
0.68387 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00565 |
| scoring_system |
epss |
| scoring_elements |
0.68407 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00565 |
| scoring_system |
epss |
| scoring_elements |
0.68384 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00565 |
| scoring_system |
epss |
| scoring_elements |
0.68435 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00565 |
| scoring_system |
epss |
| scoring_elements |
0.68452 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00565 |
| scoring_system |
epss |
| scoring_elements |
0.68478 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00565 |
| scoring_system |
epss |
| scoring_elements |
0.68466 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00565 |
| scoring_system |
epss |
| scoring_elements |
0.68433 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00565 |
| scoring_system |
epss |
| scoring_elements |
0.68472 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-30545 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-30545, GHSA-8r4m-5p6p-52rp
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-45hk-m7uv-zqfe |
|
| 4 |
| url |
VCID-7wj5-37ma-hbhg |
| vulnerability_id |
VCID-7wj5-37ma-hbhg |
| summary |
Improper Input Validation
PrestaShop is an open source e-commerce web application. Prior to version 8.1.1, it is possible to delete files from the server via the CustomerMessage API. Version 8.1.1 contains a patch for this issue. There are no known workarounds. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-39530 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00748 |
| scoring_system |
epss |
| scoring_elements |
0.73052 |
| published_at |
2026-04-07T12:55:00Z |
|
| 1 |
| value |
0.00748 |
| scoring_system |
epss |
| scoring_elements |
0.73152 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00748 |
| scoring_system |
epss |
| scoring_elements |
0.73143 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00748 |
| scoring_system |
epss |
| scoring_elements |
0.73099 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00748 |
| scoring_system |
epss |
| scoring_elements |
0.73106 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00748 |
| scoring_system |
epss |
| scoring_elements |
0.73126 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00748 |
| scoring_system |
epss |
| scoring_elements |
0.73101 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00748 |
| scoring_system |
epss |
| scoring_elements |
0.73057 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00748 |
| scoring_system |
epss |
| scoring_elements |
0.73077 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00748 |
| scoring_system |
epss |
| scoring_elements |
0.73088 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-39530 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-39530, GHSA-v4gr-v679-42p7
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7wj5-37ma-hbhg |
|
| 5 |
| url |
VCID-8beq-8rca-mbhd |
| vulnerability_id |
VCID-8beq-8rca-mbhd |
| summary |
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
PrestaShop is an open source e-commerce web application. Prior to version 8.1.1, SQL injection possible in the product search field, in BO's product page. Version 8.1.1 contains a patch for this issue. There are no known workarounds. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-39524 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00342 |
| scoring_system |
epss |
| scoring_elements |
0.56895 |
| published_at |
2026-04-07T12:55:00Z |
|
| 1 |
| value |
0.00342 |
| scoring_system |
epss |
| scoring_elements |
0.56941 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00342 |
| scoring_system |
epss |
| scoring_elements |
0.56944 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00342 |
| scoring_system |
epss |
| scoring_elements |
0.56915 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00342 |
| scoring_system |
epss |
| scoring_elements |
0.56938 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00342 |
| scoring_system |
epss |
| scoring_elements |
0.56958 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00342 |
| scoring_system |
epss |
| scoring_elements |
0.5695 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00342 |
| scoring_system |
epss |
| scoring_elements |
0.56897 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00342 |
| scoring_system |
epss |
| scoring_elements |
0.56919 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00342 |
| scoring_system |
epss |
| scoring_elements |
0.56947 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-39524 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-39524, GHSA-75p5-jwx4-qw9h
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8beq-8rca-mbhd |
|
| 6 |
| url |
VCID-9n6p-8b89-63c6 |
| vulnerability_id |
VCID-9n6p-8b89-63c6 |
| summary |
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
PrestaShop is an Open Source e-commerce web application. Versions prior to 8.0.4 and 1.7.8.9 contain a SQL filtering vulnerability. A BO user can write, update, and delete in the database, even without having specific rights. PrestaShop 8.0.4 and 1.7.8.9 contain a patch for this issue. There are no known workarounds. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-30839 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.09459 |
| scoring_system |
epss |
| scoring_elements |
0.92792 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.09459 |
| scoring_system |
epss |
| scoring_elements |
0.92823 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.09459 |
| scoring_system |
epss |
| scoring_elements |
0.92822 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.09459 |
| scoring_system |
epss |
| scoring_elements |
0.92812 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.09459 |
| scoring_system |
epss |
| scoring_elements |
0.92808 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.09459 |
| scoring_system |
epss |
| scoring_elements |
0.92804 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.09459 |
| scoring_system |
epss |
| scoring_elements |
0.92794 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.09459 |
| scoring_system |
epss |
| scoring_elements |
0.92797 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-30839 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-30839, GHSA-p379-cxqh-q822
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-9n6p-8b89-63c6 |
|
| 7 |
| url |
VCID-9x68-tvm3-5ye1 |
| vulnerability_id |
VCID-9x68-tvm3-5ye1 |
| summary |
Improper Control of Generation of Code ('Code Injection')
In the orders section of PrestaShop before 1.7.2.5, an attack is possible after gaining access to a target store with a user role with the rights of at least a Salesman or higher privileges. The attacker can then inject arbitrary PHP objects into the process and abuse an object chain in order to gain Remote Code Execution. This occurs because protection against serialized objects looks for a 0: followed by an integer, but does not consider 0:+ followed by an integer. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-20717 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02992 |
| scoring_system |
epss |
| scoring_elements |
0.86544 |
| published_at |
2026-04-09T12:55:00Z |
|
| 1 |
| value |
0.02992 |
| scoring_system |
epss |
| scoring_elements |
0.86569 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.02992 |
| scoring_system |
epss |
| scoring_elements |
0.86563 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.02992 |
| scoring_system |
epss |
| scoring_elements |
0.86549 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.02992 |
| scoring_system |
epss |
| scoring_elements |
0.86556 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.02992 |
| scoring_system |
epss |
| scoring_elements |
0.86497 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.02992 |
| scoring_system |
epss |
| scoring_elements |
0.86515 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.02992 |
| scoring_system |
epss |
| scoring_elements |
0.86535 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.02992 |
| scoring_system |
epss |
| scoring_elements |
0.86559 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.02992 |
| scoring_system |
epss |
| scoring_elements |
0.86486 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-20717 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2018-20717 |
| reference_id |
CVE-2018-20717 |
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:L/Au:S/C:P/I:P/A:P |
|
| 1 |
| value |
8.8 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
|
| 2 |
| value |
8.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
|
| 3 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2018-20717 |
|
| 8 |
|
|
| fixed_packages |
| 0 |
|
| 1 |
| url |
pkg:composer/prestashop/prestashop@1.7.2.5 |
| purl |
pkg:composer/prestashop/prestashop@1.7.2.5 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1trs-ajxn-jkhk |
|
| 1 |
| vulnerability |
VCID-22v3-9qr1-pyfg |
|
| 2 |
| vulnerability |
VCID-2kkx-8ucb-7ucj |
|
| 3 |
| vulnerability |
VCID-45hk-m7uv-zqfe |
|
| 4 |
| vulnerability |
VCID-7wj5-37ma-hbhg |
|
| 5 |
| vulnerability |
VCID-8beq-8rca-mbhd |
|
| 6 |
| vulnerability |
VCID-9n6p-8b89-63c6 |
|
| 7 |
| vulnerability |
VCID-c4g5-t8vx-syax |
|
| 8 |
| vulnerability |
VCID-cf1h-m5xj-mfc5 |
|
| 9 |
| vulnerability |
VCID-ey36-u4qn-gbge |
|
| 10 |
| vulnerability |
VCID-f4m9-pgg8-nqa3 |
|
| 11 |
| vulnerability |
VCID-f7s4-16b7-zkcm |
|
| 12 |
| vulnerability |
VCID-fkcb-5u24-wqbg |
|
| 13 |
| vulnerability |
VCID-gggb-dges-qke1 |
|
| 14 |
| vulnerability |
VCID-ghu1-c6e6-pudm |
|
| 15 |
| vulnerability |
VCID-htkt-tj6d-hydx |
|
| 16 |
| vulnerability |
VCID-keyj-v83x-nkck |
|
| 17 |
| vulnerability |
VCID-kwe1-5ukw-cbau |
|
| 18 |
| vulnerability |
VCID-mb3x-p2d7-gqdx |
|
| 19 |
| vulnerability |
VCID-qx7c-y2p8-vye9 |
|
| 20 |
| vulnerability |
VCID-vcuy-9cdj-uyhz |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:composer/prestashop/prestashop@1.7.2.5 |
|
|
| aliases |
CVE-2018-20717, GHSA-xx67-2j3v-h76p
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-9x68-tvm3-5ye1 |
|
| 8 |
| url |
VCID-c4g5-t8vx-syax |
| vulnerability_id |
VCID-c4g5-t8vx-syax |
| summary |
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
PrestaShop is an open source e-commerce web application. Prior to version 8.1.1, the `displayAjaxEmailHTML` method can be used to read any file on the server, potentially even outside of the project if the server is not correctly configured. Version 8.1.1 contains a patch for this issue. There are no known workarounds. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-39528 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00602 |
| scoring_system |
epss |
| scoring_elements |
0.69465 |
| published_at |
2026-04-07T12:55:00Z |
|
| 1 |
| value |
0.00602 |
| scoring_system |
epss |
| scoring_elements |
0.69573 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00602 |
| scoring_system |
epss |
| scoring_elements |
0.69564 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00602 |
| scoring_system |
epss |
| scoring_elements |
0.69524 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00602 |
| scoring_system |
epss |
| scoring_elements |
0.69538 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00602 |
| scoring_system |
epss |
| scoring_elements |
0.69553 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00602 |
| scoring_system |
epss |
| scoring_elements |
0.69531 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00602 |
| scoring_system |
epss |
| scoring_elements |
0.69469 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00602 |
| scoring_system |
epss |
| scoring_elements |
0.69485 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00602 |
| scoring_system |
epss |
| scoring_elements |
0.69515 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-39528 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-39528, GHSA-hpf4-v7v2-95p2
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-c4g5-t8vx-syax |
|
| 9 |
| url |
VCID-cf1h-m5xj-mfc5 |
| vulnerability_id |
VCID-cf1h-m5xj-mfc5 |
| summary |
PrestaShop affected by time based enumeration in FO login form
### Impact
A time-based user enumeration vulnerability in the user authentication functionality of PrestaShop. This vulnerability allows an attacker to determine whether a customer account exists in the system by measuring response times.
### Patches
8.2.4 and 9.0.3
### Workarounds
none
### References
Found by Lam Yiu Tung |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-25597 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18824 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18836 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00077 |
| scoring_system |
epss |
| scoring_elements |
0.23209 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00077 |
| scoring_system |
epss |
| scoring_elements |
0.23253 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00077 |
| scoring_system |
epss |
| scoring_elements |
0.23043 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00077 |
| scoring_system |
epss |
| scoring_elements |
0.23116 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00077 |
| scoring_system |
epss |
| scoring_elements |
0.23169 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00077 |
| scoring_system |
epss |
| scoring_elements |
0.2319 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00077 |
| scoring_system |
epss |
| scoring_elements |
0.23152 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00077 |
| scoring_system |
epss |
| scoring_elements |
0.23094 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-25597 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-25597, GHSA-67v7-3g49-mxh2
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-cf1h-m5xj-mfc5 |
|
| 10 |
| url |
VCID-ey36-u4qn-gbge |
| vulnerability_id |
VCID-ey36-u4qn-gbge |
| summary |
Improper Privilege Management
PrestaShop is an Open Source e-commerce web application. In the Prestashop Back office interface, an employee can list all modules without any access rights: method `ajaxProcessGetPossibleHookingListForModule` does not check access rights. This issue has been addressed in commit `15bd281c` which is included in version 8.1.2. Users are advised to upgrade. There are no known workaround for this issue. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-43664 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00239 |
| scoring_system |
epss |
| scoring_elements |
0.4695 |
| published_at |
2026-04-07T12:55:00Z |
|
| 1 |
| value |
0.00239 |
| scoring_system |
epss |
| scoring_elements |
0.47058 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00239 |
| scoring_system |
epss |
| scoring_elements |
0.47062 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00239 |
| scoring_system |
epss |
| scoring_elements |
0.47006 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00239 |
| scoring_system |
epss |
| scoring_elements |
0.46999 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00239 |
| scoring_system |
epss |
| scoring_elements |
0.47025 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00239 |
| scoring_system |
epss |
| scoring_elements |
0.47001 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00239 |
| scoring_system |
epss |
| scoring_elements |
0.46984 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00239 |
| scoring_system |
epss |
| scoring_elements |
0.47002 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00239 |
| scoring_system |
epss |
| scoring_elements |
0.47004 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-43664 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-43664, GHSA-gvrg-62jp-rf7j
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ey36-u4qn-gbge |
|
| 11 |
| url |
VCID-f4m9-pgg8-nqa3 |
| vulnerability_id |
VCID-f4m9-pgg8-nqa3 |
| summary |
PrestaShop XSS can be stored in DB from "add a message form" in order detail page (FO)
### Impact
The isCleanHtml method is not used on this this form, which makes it possible to store an xss in DB.
The impact is low because the html is not interpreted in BO, thanks to twig's escape mechanism.
In FO, the xss is effective, but only impacts the customer sending it, or the customer session from which it was sent.
Be careful if you have a module fetching these messages from the DB and displaying it without escaping html.
### Patches
8.1.x
### Reporter
Reported by Rona Febriana (linkedin: https://www.linkedin.com/in/rona-febriana/) |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-21628 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00384 |
| scoring_system |
epss |
| scoring_elements |
0.59683 |
| published_at |
2026-04-09T12:55:00Z |
|
| 1 |
| value |
0.00384 |
| scoring_system |
epss |
| scoring_elements |
0.59707 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00384 |
| scoring_system |
epss |
| scoring_elements |
0.59699 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00384 |
| scoring_system |
epss |
| scoring_elements |
0.59666 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00384 |
| scoring_system |
epss |
| scoring_elements |
0.59685 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00384 |
| scoring_system |
epss |
| scoring_elements |
0.59702 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00384 |
| scoring_system |
epss |
| scoring_elements |
0.59624 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.00384 |
| scoring_system |
epss |
| scoring_elements |
0.59649 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00384 |
| scoring_system |
epss |
| scoring_elements |
0.59619 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00384 |
| scoring_system |
epss |
| scoring_elements |
0.5967 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-21628 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-21628, GHSA-vr7m-r9vm-m4wf
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-f4m9-pgg8-nqa3 |
|
| 12 |
| url |
VCID-f7s4-16b7-zkcm |
| vulnerability_id |
VCID-f7s4-16b7-zkcm |
| summary |
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
PrestaShop is an open source e-commerce web application. Versions prior to 1.7.8.10, 8.0.5, and 8.1.1 is vulnerable to remote code execution through SQL injection and arbitrary file write in the back office. Versions 1.7.8.10, 8.0.5, and 8.1.1 contain a patch. There are no known workarounds. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-39526 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.10781 |
| scoring_system |
epss |
| scoring_elements |
0.93328 |
| published_at |
2026-04-07T12:55:00Z |
|
| 1 |
| value |
0.10781 |
| scoring_system |
epss |
| scoring_elements |
0.93368 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.10781 |
| scoring_system |
epss |
| scoring_elements |
0.93363 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.10781 |
| scoring_system |
epss |
| scoring_elements |
0.93345 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.10781 |
| scoring_system |
epss |
| scoring_elements |
0.93344 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.10781 |
| scoring_system |
epss |
| scoring_elements |
0.93346 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.10781 |
| scoring_system |
epss |
| scoring_elements |
0.93341 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.10781 |
| scoring_system |
epss |
| scoring_elements |
0.93323 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.10781 |
| scoring_system |
epss |
| scoring_elements |
0.93329 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.10781 |
| scoring_system |
epss |
| scoring_elements |
0.93337 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-39526 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-39526, GHSA-gf46-prm4-56pc
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-f7s4-16b7-zkcm |
|
| 13 |
| url |
VCID-fkcb-5u24-wqbg |
| vulnerability_id |
VCID-fkcb-5u24-wqbg |
| summary |
PrestaShop some attribute not escaped in Validate::isCleanHTML method
### Description
Some event attributes are not detected by the isCleanHTML method
### Impact
Some modules using the isCleanHTML method could be vulnerable to xss
### Patches
8.1.3, 1.7.8.11
### Workarounds
The best workaround is to use the `HTMLPurifier` library to sanitize html input coming from users. The library is already available as a dependency in the PrestaShop project. Beware though that in legacy object models, fields of `HTML` type will call `isCleanHTML`.
### Reporters
Reported by Antonio Russo (@Antonio-R1 on GitHub) and Antonio Rocco Spataro (@antoniospataro on GitHub). |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-21627 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0095 |
| scoring_system |
epss |
| scoring_elements |
0.76367 |
| published_at |
2026-04-09T12:55:00Z |
|
| 1 |
| value |
0.0095 |
| scoring_system |
epss |
| scoring_elements |
0.76413 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.0095 |
| scoring_system |
epss |
| scoring_elements |
0.76406 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.0095 |
| scoring_system |
epss |
| scoring_elements |
0.76366 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.0095 |
| scoring_system |
epss |
| scoring_elements |
0.76371 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.0095 |
| scoring_system |
epss |
| scoring_elements |
0.76393 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.0095 |
| scoring_system |
epss |
| scoring_elements |
0.76311 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.0095 |
| scoring_system |
epss |
| scoring_elements |
0.76341 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.0095 |
| scoring_system |
epss |
| scoring_elements |
0.76321 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.0095 |
| scoring_system |
epss |
| scoring_elements |
0.76354 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-21627 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-21627, GHSA-xgpm-q3mq-46rq
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-fkcb-5u24-wqbg |
|
| 14 |
| url |
VCID-gggb-dges-qke1 |
| vulnerability_id |
VCID-gggb-dges-qke1 |
| summary |
Cross-Site Request Forgery (CSRF)
PrestaShop is an open source e-commerce web application that, prior to version 8.0.1, is vulnerable to cross-site request forgery (CSRF). When authenticating users, PrestaShop preserves session attributes. Because this does not clear CSRF tokens upon login, this might enable same-site attackers to bypass the CSRF protection mechanism by performing an attack similar to a session-fixation. The problem is fixed in version 8.0.1. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-25170 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00067 |
| scoring_system |
epss |
| scoring_elements |
0.20867 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00067 |
| scoring_system |
epss |
| scoring_elements |
0.20809 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00091 |
| scoring_system |
epss |
| scoring_elements |
0.25633 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00091 |
| scoring_system |
epss |
| scoring_elements |
0.25632 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00091 |
| scoring_system |
epss |
| scoring_elements |
0.25689 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00091 |
| scoring_system |
epss |
| scoring_elements |
0.25599 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00091 |
| scoring_system |
epss |
| scoring_elements |
0.2573 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00091 |
| scoring_system |
epss |
| scoring_elements |
0.25617 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00091 |
| scoring_system |
epss |
| scoring_elements |
0.25718 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00091 |
| scoring_system |
epss |
| scoring_elements |
0.25672 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-25170 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:composer/prestashop/prestashop@8.0.1 |
| purl |
pkg:composer/prestashop/prestashop@8.0.1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1trs-ajxn-jkhk |
|
| 1 |
| vulnerability |
VCID-22v3-9qr1-pyfg |
|
| 2 |
| vulnerability |
VCID-2kkx-8ucb-7ucj |
|
| 3 |
| vulnerability |
VCID-45hk-m7uv-zqfe |
|
| 4 |
| vulnerability |
VCID-7wj5-37ma-hbhg |
|
| 5 |
| vulnerability |
VCID-8beq-8rca-mbhd |
|
| 6 |
| vulnerability |
VCID-9n6p-8b89-63c6 |
|
| 7 |
| vulnerability |
VCID-c4g5-t8vx-syax |
|
| 8 |
| vulnerability |
VCID-cf1h-m5xj-mfc5 |
|
| 9 |
| vulnerability |
VCID-ey36-u4qn-gbge |
|
| 10 |
| vulnerability |
VCID-f4m9-pgg8-nqa3 |
|
| 11 |
| vulnerability |
VCID-f7s4-16b7-zkcm |
|
| 12 |
| vulnerability |
VCID-fkcb-5u24-wqbg |
|
| 13 |
| vulnerability |
VCID-keyj-v83x-nkck |
|
| 14 |
| vulnerability |
VCID-kwe1-5ukw-cbau |
|
| 15 |
| vulnerability |
VCID-mb3x-p2d7-gqdx |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:composer/prestashop/prestashop@8.0.1 |
|
|
| aliases |
CVE-2023-25170, GHSA-3g43-x7qr-96ph
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-gggb-dges-qke1 |
|
| 15 |
| url |
VCID-ghu1-c6e6-pudm |
| vulnerability_id |
VCID-ghu1-c6e6-pudm |
| summary |
Improper Control of Generation of Code ('Code Injection')
PrestaShop is an Open Source e-commerce platform. Starting with version 1.7.0.0 and ending with version 1.7.8.3, an attacker is able to inject twig code inside the back office when using the legacy layout. The problem is fixed in version 1.7.8.3. There are no known workarounds. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-21686 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0051 |
| scoring_system |
epss |
| scoring_elements |
0.66352 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.0051 |
| scoring_system |
epss |
| scoring_elements |
0.6644 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.0051 |
| scoring_system |
epss |
| scoring_elements |
0.66423 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.0051 |
| scoring_system |
epss |
| scoring_elements |
0.66387 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.0051 |
| scoring_system |
epss |
| scoring_elements |
0.66418 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.0051 |
| scoring_system |
epss |
| scoring_elements |
0.6643 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.0051 |
| scoring_system |
epss |
| scoring_elements |
0.6641 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.0051 |
| scoring_system |
epss |
| scoring_elements |
0.66396 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.0051 |
| scoring_system |
epss |
| scoring_elements |
0.66348 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.0051 |
| scoring_system |
epss |
| scoring_elements |
0.66379 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-21686 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-21686, GHSA-mrq4-7ch7-2465
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ghu1-c6e6-pudm |
|
| 16 |
| url |
VCID-htkt-tj6d-hydx |
| vulnerability_id |
VCID-htkt-tj6d-hydx |
| summary |
PrestaShop has potential Information exposure in the upload directory
### Impact
Potential Information exposure in the upload directory.
### Patches
Patch in PrestaShop 1.7.8.8
### References
https://capec.mitre.org/data/definitions/87.html
Thanks to DZPATROL |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-46158 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0007 |
| scoring_system |
epss |
| scoring_elements |
0.21521 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.0007 |
| scoring_system |
epss |
| scoring_elements |
0.21392 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.0007 |
| scoring_system |
epss |
| scoring_elements |
0.21385 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.0007 |
| scoring_system |
epss |
| scoring_elements |
0.2139 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.0007 |
| scoring_system |
epss |
| scoring_elements |
0.21446 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.0007 |
| scoring_system |
epss |
| scoring_elements |
0.21485 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.0007 |
| scoring_system |
epss |
| scoring_elements |
0.21473 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.0007 |
| scoring_system |
epss |
| scoring_elements |
0.21335 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.0007 |
| scoring_system |
epss |
| scoring_elements |
0.2158 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.0007 |
| scoring_system |
epss |
| scoring_elements |
0.21413 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-46158 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-46158, GHSA-9qgp-9wwc-v29r, GMS-2022-8006
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-htkt-tj6d-hydx |
|
| 17 |
| url |
VCID-keyj-v83x-nkck |
| vulnerability_id |
VCID-keyj-v83x-nkck |
| summary |
Improper Privilege Management
PrestaShop is an Open Source e-commerce web application. In affected versions any module can be disabled or uninstalled from back office, even with low user right. This allows low privileged users to disable portions of a shops functionality. Commit `ce1f6708` addresses this issue and is included in version 8.1.2. Users are advised to upgrade. There are no known workarounds for this issue. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-43663 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00102 |
| scoring_system |
epss |
| scoring_elements |
0.28015 |
| published_at |
2026-04-07T12:55:00Z |
|
| 1 |
| value |
0.00102 |
| scoring_system |
epss |
| scoring_elements |
0.28023 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00102 |
| scoring_system |
epss |
| scoring_elements |
0.2804 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00102 |
| scoring_system |
epss |
| scoring_elements |
0.28031 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00102 |
| scoring_system |
epss |
| scoring_elements |
0.28088 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00102 |
| scoring_system |
epss |
| scoring_elements |
0.28132 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00102 |
| scoring_system |
epss |
| scoring_elements |
0.28125 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00102 |
| scoring_system |
epss |
| scoring_elements |
0.28177 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00102 |
| scoring_system |
epss |
| scoring_elements |
0.2822 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00102 |
| scoring_system |
epss |
| scoring_elements |
0.28082 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-43663 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-43663, GHSA-6jmf-2pfc-q9m7
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-keyj-v83x-nkck |
|
| 18 |
| url |
VCID-kwe1-5ukw-cbau |
| vulnerability_id |
VCID-kwe1-5ukw-cbau |
| summary |
Improper Encoding or Escaping of Output
PrestaShop is an open source e-commerce web application. Versions prior to 1.7.8.10, 8.0.5, and 8.1.1 is vulnerable to cross-site scripting through the `isCleanHTML` method. Versions 1.7.8.10, 8.0.5, and 8.1.1 contain a patch. There are no known workarounds. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-39527 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01508 |
| scoring_system |
epss |
| scoring_elements |
0.81149 |
| published_at |
2026-04-07T12:55:00Z |
|
| 1 |
| value |
0.01508 |
| scoring_system |
epss |
| scoring_elements |
0.8122 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.01508 |
| scoring_system |
epss |
| scoring_elements |
0.81219 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.01508 |
| scoring_system |
epss |
| scoring_elements |
0.81181 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.01508 |
| scoring_system |
epss |
| scoring_elements |
0.81189 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.01508 |
| scoring_system |
epss |
| scoring_elements |
0.81202 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.01508 |
| scoring_system |
epss |
| scoring_elements |
0.81183 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.01508 |
| scoring_system |
epss |
| scoring_elements |
0.81126 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.01508 |
| scoring_system |
epss |
| scoring_elements |
0.8115 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.01508 |
| scoring_system |
epss |
| scoring_elements |
0.81177 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-39527 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-39527, GHSA-xw2r-f8xv-c8xp
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-kwe1-5ukw-cbau |
|
| 19 |
| url |
VCID-mb3x-p2d7-gqdx |
| vulnerability_id |
VCID-mb3x-p2d7-gqdx |
| summary |
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
PrestaShop is an open source e-commerce web application. Prior to version 8.1.1, in the back office, files can be compromised using path traversal by replaying the import file deletion query with a specified file path that uses the traversal path. Version 8.1.1 contains a patch for this issue. There are no known workarounds. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-39525 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01261 |
| scoring_system |
epss |
| scoring_elements |
0.79389 |
| published_at |
2026-04-07T12:55:00Z |
|
| 1 |
| value |
0.01261 |
| scoring_system |
epss |
| scoring_elements |
0.7938 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01261 |
| scoring_system |
epss |
| scoring_elements |
0.79402 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01261 |
| scoring_system |
epss |
| scoring_elements |
0.79451 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.01261 |
| scoring_system |
epss |
| scoring_elements |
0.79453 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.01261 |
| scoring_system |
epss |
| scoring_elements |
0.79422 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.01261 |
| scoring_system |
epss |
| scoring_elements |
0.79432 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.01261 |
| scoring_system |
epss |
| scoring_elements |
0.79449 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.01261 |
| scoring_system |
epss |
| scoring_elements |
0.79426 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.01261 |
| scoring_system |
epss |
| scoring_elements |
0.79416 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-39525 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-39525, GHSA-m9r4-3fg7-pqm2
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-mb3x-p2d7-gqdx |
|
| 20 |
| url |
VCID-qx7c-y2p8-vye9 |
| vulnerability_id |
VCID-qx7c-y2p8-vye9 |
| summary |
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
A cross-site scripting (XSS) vulnerability in PrestaShop v1.7.7.4 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the message parameter in /contactform/contactform.php. |
| references |
|
| fixed_packages |
| 0 |
| url |
pkg:composer/prestashop/prestashop@1.7.7.5 |
| purl |
pkg:composer/prestashop/prestashop@1.7.7.5 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1trs-ajxn-jkhk |
|
| 1 |
| vulnerability |
VCID-22v3-9qr1-pyfg |
|
| 2 |
| vulnerability |
VCID-2kkx-8ucb-7ucj |
|
| 3 |
| vulnerability |
VCID-45hk-m7uv-zqfe |
|
| 4 |
| vulnerability |
VCID-7wj5-37ma-hbhg |
|
| 5 |
| vulnerability |
VCID-8beq-8rca-mbhd |
|
| 6 |
| vulnerability |
VCID-9n6p-8b89-63c6 |
|
| 7 |
| vulnerability |
VCID-bmyy-gqbc-ybhz |
|
| 8 |
| vulnerability |
VCID-c4g5-t8vx-syax |
|
| 9 |
| vulnerability |
VCID-cf1h-m5xj-mfc5 |
|
| 10 |
| vulnerability |
VCID-ey36-u4qn-gbge |
|
| 11 |
| vulnerability |
VCID-f4m9-pgg8-nqa3 |
|
| 12 |
| vulnerability |
VCID-f7s4-16b7-zkcm |
|
| 13 |
| vulnerability |
VCID-fkcb-5u24-wqbg |
|
| 14 |
| vulnerability |
VCID-gggb-dges-qke1 |
|
| 15 |
| vulnerability |
VCID-ghu1-c6e6-pudm |
|
| 16 |
| vulnerability |
VCID-htkt-tj6d-hydx |
|
| 17 |
| vulnerability |
VCID-keyj-v83x-nkck |
|
| 18 |
| vulnerability |
VCID-kwe1-5ukw-cbau |
|
| 19 |
| vulnerability |
VCID-mb3x-p2d7-gqdx |
|
| 20 |
| vulnerability |
VCID-vcuy-9cdj-uyhz |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:composer/prestashop/prestashop@1.7.7.5 |
|
|
| aliases |
CVE-2023-31508, GHSA-6mhc-hqr3-w466
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qx7c-y2p8-vye9 |
|
| 21 |
| url |
VCID-vcuy-9cdj-uyhz |
| vulnerability_id |
VCID-vcuy-9cdj-uyhz |
| summary |
PrestaShop eval injection possible if shop vulnerable to SQL injection
### Impact
Eval injection possible if the shop is vulnerable to an SQL injection.
### Patches
The problem is fixed in version 1.7.8.7
### Workarounds
Delete the MySQL Smarty cache feature by removing these lines in the file `config/smarty.config.inc.php` lines 43-46 (PrestaShop 1.7) or 40-43 (PrestaShop 1.6):
```php
if (Configuration::get('PS_SMARTY_CACHING_TYPE') == 'mysql') {
include _PS_CLASS_DIR_.'Smarty/SmartyCacheResourceMysql.php';
$smarty->caching_type = 'mysql';
}
``` |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-31181 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.78272 |
| scoring_system |
epss |
| scoring_elements |
0.99026 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.78272 |
| scoring_system |
epss |
| scoring_elements |
0.99016 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.78272 |
| scoring_system |
epss |
| scoring_elements |
0.99018 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.78272 |
| scoring_system |
epss |
| scoring_elements |
0.9902 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.78272 |
| scoring_system |
epss |
| scoring_elements |
0.99022 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.78272 |
| scoring_system |
epss |
| scoring_elements |
0.99021 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.78272 |
| scoring_system |
epss |
| scoring_elements |
0.99023 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.78272 |
| scoring_system |
epss |
| scoring_elements |
0.99024 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.78272 |
| scoring_system |
epss |
| scoring_elements |
0.99025 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-31181 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-31181, GHSA-hrgx-p36p-89q4, GMS-2022-3270
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vcuy-9cdj-uyhz |
|