Lookup for vulnerable packages by Package URL.

Purlpkg:composer/prestashop/prestashop@1.7.2.0
Typecomposer
Namespaceprestashop
Nameprestashop
Version1.7.2.0
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version8.2.4
Latest_non_vulnerable_version9.1.0
Affected_by_vulnerabilities
0
url VCID-1trs-ajxn-jkhk
vulnerability_id VCID-1trs-ajxn-jkhk
summary
Presta Shop vulnerable to email enumeration
### Impact
An unauthenticated attacker with access to the back-office URL can manipulate the id_employee and reset_token parameters to enumerate valid back-office employee email addresses.

Impacted parties:
Store administrators and employees: their email addresses are exposed.
Merchants: risk of phishing, social engineering, and brute-force attacks targeting admin accounts.

### Patches
PrestaShop 8.2.3

### Workarounds
You must upgrade, or at least apply the changes from the PrestaShop 8.2.3 patch. More information: https://build.prestashop-project.org/news/2025/prestashop-8-2-3-security-release/
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-51586
reference_id
reference_type
scores
0
value 0.00765
scoring_system epss
scoring_elements 0.73399
published_at 2026-04-02T12:55:00Z
1
value 0.00765
scoring_system epss
scoring_elements 0.7344
published_at 2026-04-13T12:55:00Z
2
value 0.00765
scoring_system epss
scoring_elements 0.73448
published_at 2026-04-12T12:55:00Z
3
value 0.00765
scoring_system epss
scoring_elements 0.73468
published_at 2026-04-11T12:55:00Z
4
value 0.00765
scoring_system epss
scoring_elements 0.73444
published_at 2026-04-09T12:55:00Z
5
value 0.00765
scoring_system epss
scoring_elements 0.73431
published_at 2026-04-08T12:55:00Z
6
value 0.00765
scoring_system epss
scoring_elements 0.73394
published_at 2026-04-07T12:55:00Z
7
value 0.00765
scoring_system epss
scoring_elements 0.73422
published_at 2026-04-04T12:55:00Z
8
value 0.00972
scoring_system epss
scoring_elements 0.76688
published_at 2026-04-18T12:55:00Z
9
value 0.00972
scoring_system epss
scoring_elements 0.76684
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-51586
1
reference_url https://build.prestashop-project.org/news/2025/prestashop-8-2-3-security-release
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://build.prestashop-project.org/news/2025/prestashop-8-2-3-security-release
2
reference_url https://github.com/PrestaShop/PrestaShop
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/PrestaShop/PrestaShop
3
reference_url https://github.com/PrestaShop/PrestaShop/commit/c97bdf10f77fedbe5a61a1dec5f96b3abb1d76fb
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/PrestaShop/PrestaShop/commit/c97bdf10f77fedbe5a61a1dec5f96b3abb1d76fb
4
reference_url https://github.com/PrestaShop/PrestaShop/releases/tag/8.2.1
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-08T17:47:26Z/
url https://github.com/PrestaShop/PrestaShop/releases/tag/8.2.1
5
reference_url https://github.com/PrestaShop/PrestaShop/releases/tag/8.2.3
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/PrestaShop/PrestaShop/releases/tag/8.2.3
6
reference_url https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-8xx5-h6m3-jr33
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-8xx5-h6m3-jr33
7
reference_url https://maxime-morel.github.io/advisories/2025/CVE-2025-51586.md
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-08T17:47:26Z/
url https://maxime-morel.github.io/advisories/2025/CVE-2025-51586.md
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2025-51586
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2025-51586
9
reference_url https://prestashop.com
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://prestashop.com
10
reference_url https://github.com/advisories/GHSA-8xx5-h6m3-jr33
reference_id GHSA-8xx5-h6m3-jr33
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-8xx5-h6m3-jr33
11
reference_url https://prestashop.com/
reference_id prestashop.com
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-08T17:47:26Z/
url https://prestashop.com/
fixed_packages
0
url pkg:composer/prestashop/prestashop@8.2.3
purl pkg:composer/prestashop/prestashop@8.2.3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-cf1h-m5xj-mfc5
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/prestashop/prestashop@8.2.3
aliases CVE-2025-51586, GHSA-8xx5-h6m3-jr33
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1trs-ajxn-jkhk
1
url VCID-22v3-9qr1-pyfg
vulnerability_id VCID-22v3-9qr1-pyfg
summary
PrestaShop file deletion via attachment API
PrestaShop is an open source e-commerce web application. Prior to version 8.1.1, it is possible to delete a file from the server by using the Attachments controller and the Attachments API. Version 8.1.1 contains a patch for this issue. There are no known workarounds.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-39529
reference_id
reference_type
scores
0
value 0.00691
scoring_system epss
scoring_elements 0.71837
published_at 2026-04-18T12:55:00Z
1
value 0.00691
scoring_system epss
scoring_elements 0.71757
published_at 2026-04-02T12:55:00Z
2
value 0.00691
scoring_system epss
scoring_elements 0.71776
published_at 2026-04-04T12:55:00Z
3
value 0.00691
scoring_system epss
scoring_elements 0.7175
published_at 2026-04-07T12:55:00Z
4
value 0.00691
scoring_system epss
scoring_elements 0.71789
published_at 2026-04-13T12:55:00Z
5
value 0.00691
scoring_system epss
scoring_elements 0.718
published_at 2026-04-09T12:55:00Z
6
value 0.00691
scoring_system epss
scoring_elements 0.71824
published_at 2026-04-11T12:55:00Z
7
value 0.00691
scoring_system epss
scoring_elements 0.71807
published_at 2026-04-12T12:55:00Z
8
value 0.00691
scoring_system epss
scoring_elements 0.71832
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-39529
1
reference_url https://github.com/PrestaShop/PrestaShop
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/PrestaShop/PrestaShop
2
reference_url https://github.com/PrestaShop/PrestaShop/commit/b08c647305dc1e9e6a2445b724d13a9733b6ed82
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T16:01:08Z/
url https://github.com/PrestaShop/PrestaShop/commit/b08c647305dc1e9e6a2445b724d13a9733b6ed82
3
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-39529
reference_id CVE-2023-39529
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-39529
4
reference_url https://github.com/advisories/GHSA-2rf5-3fw8-qm47
reference_id GHSA-2rf5-3fw8-qm47
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-2rf5-3fw8-qm47
5
reference_url https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-2rf5-3fw8-qm47
reference_id GHSA-2rf5-3fw8-qm47
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T16:01:08Z/
url https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-2rf5-3fw8-qm47
fixed_packages
0
url pkg:composer/prestashop/prestashop@8.1.1
purl pkg:composer/prestashop/prestashop@8.1.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1trs-ajxn-jkhk
1
vulnerability VCID-5s8z-4eqn-p7h7
2
vulnerability VCID-cf1h-m5xj-mfc5
3
vulnerability VCID-ey36-u4qn-gbge
4
vulnerability VCID-f4m9-pgg8-nqa3
5
vulnerability VCID-fkcb-5u24-wqbg
6
vulnerability VCID-keyj-v83x-nkck
7
vulnerability VCID-ws23-cmum-kyh6
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/prestashop/prestashop@8.1.1
aliases CVE-2023-39529, GHSA-2rf5-3fw8-qm47
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-22v3-9qr1-pyfg
2
url VCID-2kkx-8ucb-7ucj
vulnerability_id VCID-2kkx-8ucb-7ucj
summary
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
PrestaShop is an Open Source e-commerce web application. Prior to versions 8.0.4 and 1.7.8.9, the `ValidateCore::isCleanHTML()` method of Prestashop misses hijackable events which can lead to cross-site scripting (XSS) injection, allowed by the presence of pre-setup `@keyframes` methods. This XSS, which hijacks HTML attributes, can be triggered without any interaction by the visitor/administrator, which makes it as dangerous as a trivial XSS attack. Contrary to other attacks which target HTML attributes and are triggered without user interaction (such as onload / onerror which suffer from a very limited scope), this one can hijack every HTML element, which increases the danger due to a complete HTML elements scope. Versions 8.0.4 and 1.7.8.9 contain a fix for this issue.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-30838
reference_id
reference_type
scores
0
value 0.00652
scoring_system epss
scoring_elements 0.70925
published_at 2026-04-18T12:55:00Z
1
value 0.00652
scoring_system epss
scoring_elements 0.70828
published_at 2026-04-02T12:55:00Z
2
value 0.00652
scoring_system epss
scoring_elements 0.70846
published_at 2026-04-04T12:55:00Z
3
value 0.00652
scoring_system epss
scoring_elements 0.7082
published_at 2026-04-07T12:55:00Z
4
value 0.00652
scoring_system epss
scoring_elements 0.70864
published_at 2026-04-08T12:55:00Z
5
value 0.00652
scoring_system epss
scoring_elements 0.7088
published_at 2026-04-09T12:55:00Z
6
value 0.00652
scoring_system epss
scoring_elements 0.70903
published_at 2026-04-11T12:55:00Z
7
value 0.00652
scoring_system epss
scoring_elements 0.70888
published_at 2026-04-12T12:55:00Z
8
value 0.00652
scoring_system epss
scoring_elements 0.70872
published_at 2026-04-13T12:55:00Z
9
value 0.00652
scoring_system epss
scoring_elements 0.70918
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-30838
1
reference_url https://github.com/PrestaShop/PrestaShop
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/PrestaShop/PrestaShop
2
reference_url https://github.com/PrestaShop/PrestaShop/commit/46408ae4b02f3b8b1bb6e9dc63af5bcd858abd9c
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H
1
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-03T19:34:44Z/
url https://github.com/PrestaShop/PrestaShop/commit/46408ae4b02f3b8b1bb6e9dc63af5bcd858abd9c
3
reference_url https://github.com/PrestaShop/PrestaShop/commit/dc682192df0e4b0d656a8e645b29ca1b9dbe3693
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H
1
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-03T19:34:44Z/
url https://github.com/PrestaShop/PrestaShop/commit/dc682192df0e4b0d656a8e645b29ca1b9dbe3693
4
reference_url https://github.com/PrestaShop/PrestaShop/releases/tag/1.7.8.9
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/PrestaShop/PrestaShop/releases/tag/1.7.8.9
5
reference_url https://github.com/PrestaShop/PrestaShop/releases/tag/8.0.4
reference_id
reference_type
scores
0
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/PrestaShop/PrestaShop/releases/tag/8.0.4
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-30838
reference_id CVE-2023-30838
reference_type
scores
0
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-30838
7
reference_url https://github.com/advisories/GHSA-fh7r-996q-gvcp
reference_id GHSA-fh7r-996q-gvcp
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-fh7r-996q-gvcp
8
reference_url https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-fh7r-996q-gvcp
reference_id GHSA-fh7r-996q-gvcp
reference_type
scores
0
value 8.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H
1
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
2
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
3
value HIGH
scoring_system generic_textual
scoring_elements
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-03T19:34:44Z/
url https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-fh7r-996q-gvcp
fixed_packages
0
url pkg:composer/prestashop/prestashop@1.7.8%2B9
purl pkg:composer/prestashop/prestashop@1.7.8%2B9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/prestashop/prestashop@1.7.8%252B9
1
url pkg:composer/prestashop/prestashop@8.0.0-beta.1
purl pkg:composer/prestashop/prestashop@8.0.0-beta.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1trs-ajxn-jkhk
1
vulnerability VCID-22v3-9qr1-pyfg
2
vulnerability VCID-7wj5-37ma-hbhg
3
vulnerability VCID-8beq-8rca-mbhd
4
vulnerability VCID-c4g5-t8vx-syax
5
vulnerability VCID-cf1h-m5xj-mfc5
6
vulnerability VCID-ey36-u4qn-gbge
7
vulnerability VCID-f4m9-pgg8-nqa3
8
vulnerability VCID-fkcb-5u24-wqbg
9
vulnerability VCID-gggb-dges-qke1
10
vulnerability VCID-keyj-v83x-nkck
11
vulnerability VCID-mb3x-p2d7-gqdx
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/prestashop/prestashop@8.0.0-beta.1
2
url pkg:composer/prestashop/prestashop@8.0.4
purl pkg:composer/prestashop/prestashop@8.0.4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1trs-ajxn-jkhk
1
vulnerability VCID-22v3-9qr1-pyfg
2
vulnerability VCID-7wj5-37ma-hbhg
3
vulnerability VCID-8beq-8rca-mbhd
4
vulnerability VCID-c4g5-t8vx-syax
5
vulnerability VCID-cf1h-m5xj-mfc5
6
vulnerability VCID-ey36-u4qn-gbge
7
vulnerability VCID-f4m9-pgg8-nqa3
8
vulnerability VCID-f7s4-16b7-zkcm
9
vulnerability VCID-fkcb-5u24-wqbg
10
vulnerability VCID-keyj-v83x-nkck
11
vulnerability VCID-kwe1-5ukw-cbau
12
vulnerability VCID-mb3x-p2d7-gqdx
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/prestashop/prestashop@8.0.4
3
url pkg:composer/prestashop/prestashop@8.1.0-beta.1
purl pkg:composer/prestashop/prestashop@8.1.0-beta.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1trs-ajxn-jkhk
1
vulnerability VCID-22v3-9qr1-pyfg
2
vulnerability VCID-7wj5-37ma-hbhg
3
vulnerability VCID-8beq-8rca-mbhd
4
vulnerability VCID-c4g5-t8vx-syax
5
vulnerability VCID-cf1h-m5xj-mfc5
6
vulnerability VCID-ey36-u4qn-gbge
7
vulnerability VCID-f4m9-pgg8-nqa3
8
vulnerability VCID-fkcb-5u24-wqbg
9
vulnerability VCID-keyj-v83x-nkck
10
vulnerability VCID-mb3x-p2d7-gqdx
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/prestashop/prestashop@8.1.0-beta.1
aliases CVE-2023-30838, GHSA-fh7r-996q-gvcp
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2kkx-8ucb-7ucj
3
url VCID-45hk-m7uv-zqfe
vulnerability_id VCID-45hk-m7uv-zqfe
summary
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
PrestaShop is an Open Source e-commerce web application. Prior to versions 8.0.4 and 1.7.8.9, it is possible for a user with access to the SQL Manager (Advanced Options -> Database) to arbitrarily read any file on the operating system when using SQL function `LOAD_FILE` in a `SELECT` request. This gives the user access to critical information. A patch is available in PrestaShop 8.0.4 and PS 1.7.8.9
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-30545
reference_id
reference_type
scores
0
value 0.00565
scoring_system epss
scoring_elements 0.68485
published_at 2026-04-18T12:55:00Z
1
value 0.00565
scoring_system epss
scoring_elements 0.68387
published_at 2026-04-02T12:55:00Z
2
value 0.00565
scoring_system epss
scoring_elements 0.68407
published_at 2026-04-04T12:55:00Z
3
value 0.00565
scoring_system epss
scoring_elements 0.68384
published_at 2026-04-07T12:55:00Z
4
value 0.00565
scoring_system epss
scoring_elements 0.68435
published_at 2026-04-08T12:55:00Z
5
value 0.00565
scoring_system epss
scoring_elements 0.68452
published_at 2026-04-09T12:55:00Z
6
value 0.00565
scoring_system epss
scoring_elements 0.68478
published_at 2026-04-11T12:55:00Z
7
value 0.00565
scoring_system epss
scoring_elements 0.68466
published_at 2026-04-12T12:55:00Z
8
value 0.00565
scoring_system epss
scoring_elements 0.68433
published_at 2026-04-13T12:55:00Z
9
value 0.00565
scoring_system epss
scoring_elements 0.68472
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-30545
1
reference_url https://github.com/PrestaShop/PrestaShop
reference_id
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/PrestaShop/PrestaShop
2
reference_url https://github.com/PrestaShop/PrestaShop/commit/cddac4198a47c602878a787280d813f60c6c0630
reference_id
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-03T19:36:12Z/
url https://github.com/PrestaShop/PrestaShop/commit/cddac4198a47c602878a787280d813f60c6c0630
3
reference_url https://github.com/PrestaShop/PrestaShop/commit/d900806e1841a31f26ff0a1843a6888fc1bb7f81
reference_id
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-03T19:36:12Z/
url https://github.com/PrestaShop/PrestaShop/commit/d900806e1841a31f26ff0a1843a6888fc1bb7f81
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-30545
reference_id CVE-2023-30545
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-30545
5
reference_url https://github.com/advisories/GHSA-8r4m-5p6p-52rp
reference_id GHSA-8r4m-5p6p-52rp
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-8r4m-5p6p-52rp
6
reference_url https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-8r4m-5p6p-52rp
reference_id GHSA-8r4m-5p6p-52rp
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-03T19:36:12Z/
url https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-8r4m-5p6p-52rp
fixed_packages
0
url pkg:composer/prestashop/prestashop@1.7.8%2B9
purl pkg:composer/prestashop/prestashop@1.7.8%2B9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/prestashop/prestashop@1.7.8%252B9
1
url pkg:composer/prestashop/prestashop@1.7.8.9
purl pkg:composer/prestashop/prestashop@1.7.8.9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1trs-ajxn-jkhk
1
vulnerability VCID-22v3-9qr1-pyfg
2
vulnerability VCID-7wj5-37ma-hbhg
3
vulnerability VCID-8beq-8rca-mbhd
4
vulnerability VCID-c4g5-t8vx-syax
5
vulnerability VCID-cf1h-m5xj-mfc5
6
vulnerability VCID-ey36-u4qn-gbge
7
vulnerability VCID-f4m9-pgg8-nqa3
8
vulnerability VCID-keyj-v83x-nkck
9
vulnerability VCID-mb3x-p2d7-gqdx
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/prestashop/prestashop@1.7.8.9
2
url pkg:composer/prestashop/prestashop@8.0.4
purl pkg:composer/prestashop/prestashop@8.0.4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1trs-ajxn-jkhk
1
vulnerability VCID-22v3-9qr1-pyfg
2
vulnerability VCID-7wj5-37ma-hbhg
3
vulnerability VCID-8beq-8rca-mbhd
4
vulnerability VCID-c4g5-t8vx-syax
5
vulnerability VCID-cf1h-m5xj-mfc5
6
vulnerability VCID-ey36-u4qn-gbge
7
vulnerability VCID-f4m9-pgg8-nqa3
8
vulnerability VCID-f7s4-16b7-zkcm
9
vulnerability VCID-fkcb-5u24-wqbg
10
vulnerability VCID-keyj-v83x-nkck
11
vulnerability VCID-kwe1-5ukw-cbau
12
vulnerability VCID-mb3x-p2d7-gqdx
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/prestashop/prestashop@8.0.4
aliases CVE-2023-30545, GHSA-8r4m-5p6p-52rp
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-45hk-m7uv-zqfe
4
url VCID-7wj5-37ma-hbhg
vulnerability_id VCID-7wj5-37ma-hbhg
summary
Improper Input Validation
PrestaShop is an open source e-commerce web application. Prior to version 8.1.1, it is possible to delete files from the server via the CustomerMessage API. Version 8.1.1 contains a patch for this issue. There are no known workarounds.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-39530
reference_id
reference_type
scores
0
value 0.00748
scoring_system epss
scoring_elements 0.73052
published_at 2026-04-07T12:55:00Z
1
value 0.00748
scoring_system epss
scoring_elements 0.73152
published_at 2026-04-18T12:55:00Z
2
value 0.00748
scoring_system epss
scoring_elements 0.73143
published_at 2026-04-16T12:55:00Z
3
value 0.00748
scoring_system epss
scoring_elements 0.73099
published_at 2026-04-13T12:55:00Z
4
value 0.00748
scoring_system epss
scoring_elements 0.73106
published_at 2026-04-12T12:55:00Z
5
value 0.00748
scoring_system epss
scoring_elements 0.73126
published_at 2026-04-11T12:55:00Z
6
value 0.00748
scoring_system epss
scoring_elements 0.73101
published_at 2026-04-09T12:55:00Z
7
value 0.00748
scoring_system epss
scoring_elements 0.73057
published_at 2026-04-02T12:55:00Z
8
value 0.00748
scoring_system epss
scoring_elements 0.73077
published_at 2026-04-04T12:55:00Z
9
value 0.00748
scoring_system epss
scoring_elements 0.73088
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-39530
1
reference_url https://github.com/PrestaShop/PrestaShop
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/PrestaShop/PrestaShop
2
reference_url https://github.com/PrestaShop/PrestaShop/commit/6ce750b2367a7309b6bf50166f1873cb86ad57e9
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T17:33:05Z/
url https://github.com/PrestaShop/PrestaShop/commit/6ce750b2367a7309b6bf50166f1873cb86ad57e9
3
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-39530
reference_id CVE-2023-39530
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-39530
4
reference_url https://github.com/advisories/GHSA-v4gr-v679-42p7
reference_id GHSA-v4gr-v679-42p7
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-v4gr-v679-42p7
5
reference_url https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-v4gr-v679-42p7
reference_id GHSA-v4gr-v679-42p7
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-08T17:33:05Z/
url https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-v4gr-v679-42p7
fixed_packages
0
url pkg:composer/prestashop/prestashop@8.1.1
purl pkg:composer/prestashop/prestashop@8.1.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1trs-ajxn-jkhk
1
vulnerability VCID-5s8z-4eqn-p7h7
2
vulnerability VCID-cf1h-m5xj-mfc5
3
vulnerability VCID-ey36-u4qn-gbge
4
vulnerability VCID-f4m9-pgg8-nqa3
5
vulnerability VCID-fkcb-5u24-wqbg
6
vulnerability VCID-keyj-v83x-nkck
7
vulnerability VCID-ws23-cmum-kyh6
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/prestashop/prestashop@8.1.1
aliases CVE-2023-39530, GHSA-v4gr-v679-42p7
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7wj5-37ma-hbhg
5
url VCID-8beq-8rca-mbhd
vulnerability_id VCID-8beq-8rca-mbhd
summary
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
PrestaShop is an open source e-commerce web application. Prior to version 8.1.1, SQL injection possible in the product search field, in BO's product page. Version 8.1.1 contains a patch for this issue. There are no known workarounds.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-39524
reference_id
reference_type
scores
0
value 0.00342
scoring_system epss
scoring_elements 0.56895
published_at 2026-04-07T12:55:00Z
1
value 0.00342
scoring_system epss
scoring_elements 0.56941
published_at 2026-04-18T12:55:00Z
2
value 0.00342
scoring_system epss
scoring_elements 0.56944
published_at 2026-04-16T12:55:00Z
3
value 0.00342
scoring_system epss
scoring_elements 0.56915
published_at 2026-04-13T12:55:00Z
4
value 0.00342
scoring_system epss
scoring_elements 0.56938
published_at 2026-04-12T12:55:00Z
5
value 0.00342
scoring_system epss
scoring_elements 0.56958
published_at 2026-04-11T12:55:00Z
6
value 0.00342
scoring_system epss
scoring_elements 0.5695
published_at 2026-04-09T12:55:00Z
7
value 0.00342
scoring_system epss
scoring_elements 0.56897
published_at 2026-04-02T12:55:00Z
8
value 0.00342
scoring_system epss
scoring_elements 0.56919
published_at 2026-04-04T12:55:00Z
9
value 0.00342
scoring_system epss
scoring_elements 0.56947
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-39524
1
reference_url https://github.com/PrestaShop/PrestaShop
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/PrestaShop/PrestaShop
2
reference_url https://github.com/PrestaShop/PrestaShop/commit/2047d4c053043102bc46a37d383b392704bf14d7
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T16:20:18Z/
url https://github.com/PrestaShop/PrestaShop/commit/2047d4c053043102bc46a37d383b392704bf14d7
3
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-39524
reference_id CVE-2023-39524
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-39524
4
reference_url https://github.com/advisories/GHSA-75p5-jwx4-qw9h
reference_id GHSA-75p5-jwx4-qw9h
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-75p5-jwx4-qw9h
5
reference_url https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-75p5-jwx4-qw9h
reference_id GHSA-75p5-jwx4-qw9h
reference_type
scores
0
value 6.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T16:20:18Z/
url https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-75p5-jwx4-qw9h
fixed_packages
0
url pkg:composer/prestashop/prestashop@8.1.1
purl pkg:composer/prestashop/prestashop@8.1.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1trs-ajxn-jkhk
1
vulnerability VCID-5s8z-4eqn-p7h7
2
vulnerability VCID-cf1h-m5xj-mfc5
3
vulnerability VCID-ey36-u4qn-gbge
4
vulnerability VCID-f4m9-pgg8-nqa3
5
vulnerability VCID-fkcb-5u24-wqbg
6
vulnerability VCID-keyj-v83x-nkck
7
vulnerability VCID-ws23-cmum-kyh6
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/prestashop/prestashop@8.1.1
aliases CVE-2023-39524, GHSA-75p5-jwx4-qw9h
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8beq-8rca-mbhd
6
url VCID-9n6p-8b89-63c6
vulnerability_id VCID-9n6p-8b89-63c6
summary
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
PrestaShop is an Open Source e-commerce web application. Versions prior to 8.0.4 and 1.7.8.9 contain a SQL filtering vulnerability. A BO user can write, update, and delete in the database, even without having specific rights. PrestaShop 8.0.4 and 1.7.8.9 contain a patch for this issue. There are no known workarounds.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-30839
reference_id
reference_type
scores
0
value 0.09459
scoring_system epss
scoring_elements 0.92792
published_at 2026-04-02T12:55:00Z
1
value 0.09459
scoring_system epss
scoring_elements 0.92823
published_at 2026-04-18T12:55:00Z
2
value 0.09459
scoring_system epss
scoring_elements 0.92822
published_at 2026-04-16T12:55:00Z
3
value 0.09459
scoring_system epss
scoring_elements 0.92812
published_at 2026-04-13T12:55:00Z
4
value 0.09459
scoring_system epss
scoring_elements 0.92808
published_at 2026-04-09T12:55:00Z
5
value 0.09459
scoring_system epss
scoring_elements 0.92804
published_at 2026-04-08T12:55:00Z
6
value 0.09459
scoring_system epss
scoring_elements 0.92794
published_at 2026-04-07T12:55:00Z
7
value 0.09459
scoring_system epss
scoring_elements 0.92797
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-30839
1
reference_url https://github.com/PrestaShop/PrestaShop
reference_id
reference_type
scores
0
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/PrestaShop/PrestaShop
2
reference_url https://github.com/PrestaShop/PrestaShop/commit/0f2a9b7fdd42d1dd3b21d4fad586a849642f3c30
reference_id
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
2
value CRITICAL
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-03T18:07:54Z/
url https://github.com/PrestaShop/PrestaShop/commit/0f2a9b7fdd42d1dd3b21d4fad586a849642f3c30
3
reference_url https://github.com/PrestaShop/PrestaShop/commit/d1d27dc371599713c912b71bc2a455cacd7f2149
reference_id
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
2
value CRITICAL
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-03T18:07:54Z/
url https://github.com/PrestaShop/PrestaShop/commit/d1d27dc371599713c912b71bc2a455cacd7f2149
4
reference_url https://github.com/PrestaShop/PrestaShop/releases/tag/1.7.8.9
reference_id
reference_type
scores
0
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/PrestaShop/PrestaShop/releases/tag/1.7.8.9
5
reference_url https://github.com/PrestaShop/PrestaShop/releases/tag/8.0.4
reference_id
reference_type
scores
0
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/PrestaShop/PrestaShop/releases/tag/8.0.4
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-30839
reference_id CVE-2023-30839
reference_type
scores
0
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-30839
7
reference_url https://github.com/advisories/GHSA-p379-cxqh-q822
reference_id GHSA-p379-cxqh-q822
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-p379-cxqh-q822
8
reference_url https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-p379-cxqh-q822
reference_id GHSA-p379-cxqh-q822
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
2
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
3
value CRITICAL
scoring_system generic_textual
scoring_elements
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-03T18:07:54Z/
url https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-p379-cxqh-q822
fixed_packages
0
url pkg:composer/prestashop/prestashop@1.7.8%2B9
purl pkg:composer/prestashop/prestashop@1.7.8%2B9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/prestashop/prestashop@1.7.8%252B9
1
url pkg:composer/prestashop/prestashop@8.0.0-beta.1
purl pkg:composer/prestashop/prestashop@8.0.0-beta.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1trs-ajxn-jkhk
1
vulnerability VCID-22v3-9qr1-pyfg
2
vulnerability VCID-7wj5-37ma-hbhg
3
vulnerability VCID-8beq-8rca-mbhd
4
vulnerability VCID-c4g5-t8vx-syax
5
vulnerability VCID-cf1h-m5xj-mfc5
6
vulnerability VCID-ey36-u4qn-gbge
7
vulnerability VCID-f4m9-pgg8-nqa3
8
vulnerability VCID-fkcb-5u24-wqbg
9
vulnerability VCID-gggb-dges-qke1
10
vulnerability VCID-keyj-v83x-nkck
11
vulnerability VCID-mb3x-p2d7-gqdx
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/prestashop/prestashop@8.0.0-beta.1
2
url pkg:composer/prestashop/prestashop@8.0.4
purl pkg:composer/prestashop/prestashop@8.0.4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1trs-ajxn-jkhk
1
vulnerability VCID-22v3-9qr1-pyfg
2
vulnerability VCID-7wj5-37ma-hbhg
3
vulnerability VCID-8beq-8rca-mbhd
4
vulnerability VCID-c4g5-t8vx-syax
5
vulnerability VCID-cf1h-m5xj-mfc5
6
vulnerability VCID-ey36-u4qn-gbge
7
vulnerability VCID-f4m9-pgg8-nqa3
8
vulnerability VCID-f7s4-16b7-zkcm
9
vulnerability VCID-fkcb-5u24-wqbg
10
vulnerability VCID-keyj-v83x-nkck
11
vulnerability VCID-kwe1-5ukw-cbau
12
vulnerability VCID-mb3x-p2d7-gqdx
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/prestashop/prestashop@8.0.4
3
url pkg:composer/prestashop/prestashop@8.1.0-beta.1
purl pkg:composer/prestashop/prestashop@8.1.0-beta.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1trs-ajxn-jkhk
1
vulnerability VCID-22v3-9qr1-pyfg
2
vulnerability VCID-7wj5-37ma-hbhg
3
vulnerability VCID-8beq-8rca-mbhd
4
vulnerability VCID-c4g5-t8vx-syax
5
vulnerability VCID-cf1h-m5xj-mfc5
6
vulnerability VCID-ey36-u4qn-gbge
7
vulnerability VCID-f4m9-pgg8-nqa3
8
vulnerability VCID-fkcb-5u24-wqbg
9
vulnerability VCID-keyj-v83x-nkck
10
vulnerability VCID-mb3x-p2d7-gqdx
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/prestashop/prestashop@8.1.0-beta.1
aliases CVE-2023-30839, GHSA-p379-cxqh-q822
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9n6p-8b89-63c6
7
url VCID-9x68-tvm3-5ye1
vulnerability_id VCID-9x68-tvm3-5ye1
summary
Improper Control of Generation of Code ('Code Injection')
In the orders section of PrestaShop before 1.7.2.5, an attack is possible after gaining access to a target store with a user role with the rights of at least a Salesman or higher privileges. The attacker can then inject arbitrary PHP objects into the process and abuse an object chain in order to gain Remote Code Execution. This occurs because protection against serialized objects looks for a 0: followed by an integer, but does not consider 0:+ followed by an integer.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-20717
reference_id
reference_type
scores
0
value 0.02992
scoring_system epss
scoring_elements 0.86544
published_at 2026-04-09T12:55:00Z
1
value 0.02992
scoring_system epss
scoring_elements 0.86569
published_at 2026-04-18T12:55:00Z
2
value 0.02992
scoring_system epss
scoring_elements 0.86563
published_at 2026-04-16T12:55:00Z
3
value 0.02992
scoring_system epss
scoring_elements 0.86549
published_at 2026-04-13T12:55:00Z
4
value 0.02992
scoring_system epss
scoring_elements 0.86556
published_at 2026-04-12T12:55:00Z
5
value 0.02992
scoring_system epss
scoring_elements 0.86497
published_at 2026-04-02T12:55:00Z
6
value 0.02992
scoring_system epss
scoring_elements 0.86515
published_at 2026-04-07T12:55:00Z
7
value 0.02992
scoring_system epss
scoring_elements 0.86535
published_at 2026-04-08T12:55:00Z
8
value 0.02992
scoring_system epss
scoring_elements 0.86559
published_at 2026-04-11T12:55:00Z
9
value 0.02992
scoring_system epss
scoring_elements 0.86486
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-20717
1
reference_url https://blog.ripstech.com/2018/prestashop-remote-code-execution
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://blog.ripstech.com/2018/prestashop-remote-code-execution
2
reference_url https://blog.ripstech.com/2018/prestashop-remote-code-execution/
reference_id
reference_type
scores
url https://blog.ripstech.com/2018/prestashop-remote-code-execution/
3
reference_url https://build.prestashop.com/news/prestashop-1-7-2-5-maintenance-release
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://build.prestashop.com/news/prestashop-1-7-2-5-maintenance-release
4
reference_url https://build.prestashop.com/news/prestashop-1-7-2-5-maintenance-release/
reference_id
reference_type
scores
url https://build.prestashop.com/news/prestashop-1-7-2-5-maintenance-release/
5
reference_url https://github.com/PrestaShop/PrestaShop
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/PrestaShop/PrestaShop
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:prestashop:prestashop:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:prestashop:prestashop:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:prestashop:prestashop:*:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-20717
reference_id CVE-2018-20717
reference_type
scores
0
value 6.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
2
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
3
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2018-20717
8
reference_url https://github.com/advisories/GHSA-xx67-2j3v-h76p
reference_id GHSA-xx67-2j3v-h76p
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-xx67-2j3v-h76p
fixed_packages
0
url pkg:composer/prestashop/prestashop@1.7.2%2B5
purl pkg:composer/prestashop/prestashop@1.7.2%2B5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/prestashop/prestashop@1.7.2%252B5
1
url pkg:composer/prestashop/prestashop@1.7.2.5
purl pkg:composer/prestashop/prestashop@1.7.2.5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1trs-ajxn-jkhk
1
vulnerability VCID-22v3-9qr1-pyfg
2
vulnerability VCID-2kkx-8ucb-7ucj
3
vulnerability VCID-45hk-m7uv-zqfe
4
vulnerability VCID-7wj5-37ma-hbhg
5
vulnerability VCID-8beq-8rca-mbhd
6
vulnerability VCID-9n6p-8b89-63c6
7
vulnerability VCID-c4g5-t8vx-syax
8
vulnerability VCID-cf1h-m5xj-mfc5
9
vulnerability VCID-ey36-u4qn-gbge
10
vulnerability VCID-f4m9-pgg8-nqa3
11
vulnerability VCID-f7s4-16b7-zkcm
12
vulnerability VCID-fkcb-5u24-wqbg
13
vulnerability VCID-gggb-dges-qke1
14
vulnerability VCID-ghu1-c6e6-pudm
15
vulnerability VCID-htkt-tj6d-hydx
16
vulnerability VCID-keyj-v83x-nkck
17
vulnerability VCID-kwe1-5ukw-cbau
18
vulnerability VCID-mb3x-p2d7-gqdx
19
vulnerability VCID-qx7c-y2p8-vye9
20
vulnerability VCID-vcuy-9cdj-uyhz
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/prestashop/prestashop@1.7.2.5
aliases CVE-2018-20717, GHSA-xx67-2j3v-h76p
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9x68-tvm3-5ye1
8
url VCID-c4g5-t8vx-syax
vulnerability_id VCID-c4g5-t8vx-syax
summary
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
PrestaShop is an open source e-commerce web application. Prior to version 8.1.1, the `displayAjaxEmailHTML` method can be used to read any file on the server, potentially even outside of the project if the server is not correctly configured. Version 8.1.1 contains a patch for this issue. There are no known workarounds.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-39528
reference_id
reference_type
scores
0
value 0.00602
scoring_system epss
scoring_elements 0.69465
published_at 2026-04-07T12:55:00Z
1
value 0.00602
scoring_system epss
scoring_elements 0.69573
published_at 2026-04-18T12:55:00Z
2
value 0.00602
scoring_system epss
scoring_elements 0.69564
published_at 2026-04-16T12:55:00Z
3
value 0.00602
scoring_system epss
scoring_elements 0.69524
published_at 2026-04-13T12:55:00Z
4
value 0.00602
scoring_system epss
scoring_elements 0.69538
published_at 2026-04-12T12:55:00Z
5
value 0.00602
scoring_system epss
scoring_elements 0.69553
published_at 2026-04-11T12:55:00Z
6
value 0.00602
scoring_system epss
scoring_elements 0.69531
published_at 2026-04-09T12:55:00Z
7
value 0.00602
scoring_system epss
scoring_elements 0.69469
published_at 2026-04-02T12:55:00Z
8
value 0.00602
scoring_system epss
scoring_elements 0.69485
published_at 2026-04-04T12:55:00Z
9
value 0.00602
scoring_system epss
scoring_elements 0.69515
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-39528
1
reference_url https://github.com/PrestaShop/PrestaShop
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/PrestaShop/PrestaShop
2
reference_url https://github.com/PrestaShop/PrestaShop/commit/11de3a84322fa4ecd0995ac40d575db61804724c
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T16:01:14Z/
url https://github.com/PrestaShop/PrestaShop/commit/11de3a84322fa4ecd0995ac40d575db61804724c
3
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-39528
reference_id CVE-2023-39528
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-39528
4
reference_url https://github.com/advisories/GHSA-hpf4-v7v2-95p2
reference_id GHSA-hpf4-v7v2-95p2
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-hpf4-v7v2-95p2
5
reference_url https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-hpf4-v7v2-95p2
reference_id GHSA-hpf4-v7v2-95p2
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T16:01:14Z/
url https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-hpf4-v7v2-95p2
fixed_packages
0
url pkg:composer/prestashop/prestashop@8.1.1
purl pkg:composer/prestashop/prestashop@8.1.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1trs-ajxn-jkhk
1
vulnerability VCID-5s8z-4eqn-p7h7
2
vulnerability VCID-cf1h-m5xj-mfc5
3
vulnerability VCID-ey36-u4qn-gbge
4
vulnerability VCID-f4m9-pgg8-nqa3
5
vulnerability VCID-fkcb-5u24-wqbg
6
vulnerability VCID-keyj-v83x-nkck
7
vulnerability VCID-ws23-cmum-kyh6
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/prestashop/prestashop@8.1.1
aliases CVE-2023-39528, GHSA-hpf4-v7v2-95p2
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c4g5-t8vx-syax
9
url VCID-cf1h-m5xj-mfc5
vulnerability_id VCID-cf1h-m5xj-mfc5
summary
PrestaShop affected by time based enumeration in FO login form
### Impact
A time-based user enumeration vulnerability in the user authentication functionality of PrestaShop. This vulnerability allows an attacker to determine whether a customer account exists in the system by measuring response times.

### Patches
8.2.4 and 9.0.3

### Workarounds
none

### References
Found by Lam Yiu Tung
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-25597
reference_id
reference_type
scores
0
value 0.0006
scoring_system epss
scoring_elements 0.18824
published_at 2026-04-16T12:55:00Z
1
value 0.0006
scoring_system epss
scoring_elements 0.18836
published_at 2026-04-18T12:55:00Z
2
value 0.00077
scoring_system epss
scoring_elements 0.23209
published_at 2026-04-02T12:55:00Z
3
value 0.00077
scoring_system epss
scoring_elements 0.23253
published_at 2026-04-04T12:55:00Z
4
value 0.00077
scoring_system epss
scoring_elements 0.23043
published_at 2026-04-07T12:55:00Z
5
value 0.00077
scoring_system epss
scoring_elements 0.23116
published_at 2026-04-08T12:55:00Z
6
value 0.00077
scoring_system epss
scoring_elements 0.23169
published_at 2026-04-09T12:55:00Z
7
value 0.00077
scoring_system epss
scoring_elements 0.2319
published_at 2026-04-11T12:55:00Z
8
value 0.00077
scoring_system epss
scoring_elements 0.23152
published_at 2026-04-12T12:55:00Z
9
value 0.00077
scoring_system epss
scoring_elements 0.23094
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-25597
1
reference_url https://github.com/PrestaShop/PrestaShop
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/PrestaShop/PrestaShop
2
reference_url https://github.com/PrestaShop/PrestaShop/releases/tag/8.2.4
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-09T15:22:00Z/
url https://github.com/PrestaShop/PrestaShop/releases/tag/8.2.4
3
reference_url https://github.com/PrestaShop/PrestaShop/releases/tag/9.0.3
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-09T15:22:00Z/
url https://github.com/PrestaShop/PrestaShop/releases/tag/9.0.3
4
reference_url https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-67v7-3g49-mxh2
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-09T15:22:00Z/
url https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-67v7-3g49-mxh2
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2026-25597
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2026-25597
6
reference_url https://github.com/advisories/GHSA-67v7-3g49-mxh2
reference_id GHSA-67v7-3g49-mxh2
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-67v7-3g49-mxh2
fixed_packages
0
url pkg:composer/prestashop/prestashop@8.2.4
purl pkg:composer/prestashop/prestashop@8.2.4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/prestashop/prestashop@8.2.4
1
url pkg:composer/prestashop/prestashop@9.0.3
purl pkg:composer/prestashop/prestashop@9.0.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/prestashop/prestashop@9.0.3
2
url pkg:composer/prestashop/prestashop@9.1.0-beta.1
purl pkg:composer/prestashop/prestashop@9.1.0-beta.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/prestashop/prestashop@9.1.0-beta.1
aliases CVE-2026-25597, GHSA-67v7-3g49-mxh2
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cf1h-m5xj-mfc5
10
url VCID-ey36-u4qn-gbge
vulnerability_id VCID-ey36-u4qn-gbge
summary
Improper Privilege Management
PrestaShop is an Open Source e-commerce web application. In the Prestashop Back office interface, an employee can list all modules without any access rights: method `ajaxProcessGetPossibleHookingListForModule` does not check access rights. This issue has been addressed in commit `15bd281c` which is included in version 8.1.2. Users are advised to upgrade. There are no known workaround for this issue.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-43664
reference_id
reference_type
scores
0
value 0.00239
scoring_system epss
scoring_elements 0.4695
published_at 2026-04-07T12:55:00Z
1
value 0.00239
scoring_system epss
scoring_elements 0.47058
published_at 2026-04-18T12:55:00Z
2
value 0.00239
scoring_system epss
scoring_elements 0.47062
published_at 2026-04-16T12:55:00Z
3
value 0.00239
scoring_system epss
scoring_elements 0.47006
published_at 2026-04-13T12:55:00Z
4
value 0.00239
scoring_system epss
scoring_elements 0.46999
published_at 2026-04-12T12:55:00Z
5
value 0.00239
scoring_system epss
scoring_elements 0.47025
published_at 2026-04-11T12:55:00Z
6
value 0.00239
scoring_system epss
scoring_elements 0.47001
published_at 2026-04-09T12:55:00Z
7
value 0.00239
scoring_system epss
scoring_elements 0.46984
published_at 2026-04-02T12:55:00Z
8
value 0.00239
scoring_system epss
scoring_elements 0.47002
published_at 2026-04-04T12:55:00Z
9
value 0.00239
scoring_system epss
scoring_elements 0.47004
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-43664
1
reference_url https://github.com/PrestaShop/PrestaShop
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/PrestaShop/PrestaShop
2
reference_url https://github.com/PrestaShop/PrestaShop/commit/15bd281c18f032a5134a8d213b44d24829d45762
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-20T17:48:03Z/
url https://github.com/PrestaShop/PrestaShop/commit/15bd281c18f032a5134a8d213b44d24829d45762
3
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-43664
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-43664
4
reference_url https://github.com/advisories/GHSA-gvrg-62jp-rf7j
reference_id GHSA-gvrg-62jp-rf7j
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-gvrg-62jp-rf7j
5
reference_url https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-gvrg-62jp-rf7j
reference_id GHSA-gvrg-62jp-rf7j
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-20T17:48:03Z/
url https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-gvrg-62jp-rf7j
fixed_packages
0
url pkg:composer/prestashop/prestashop@8.1.2
purl pkg:composer/prestashop/prestashop@8.1.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1trs-ajxn-jkhk
1
vulnerability VCID-5s8z-4eqn-p7h7
2
vulnerability VCID-cf1h-m5xj-mfc5
3
vulnerability VCID-f4m9-pgg8-nqa3
4
vulnerability VCID-fkcb-5u24-wqbg
5
vulnerability VCID-ws23-cmum-kyh6
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/prestashop/prestashop@8.1.2
aliases CVE-2023-43664, GHSA-gvrg-62jp-rf7j
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ey36-u4qn-gbge
11
url VCID-f4m9-pgg8-nqa3
vulnerability_id VCID-f4m9-pgg8-nqa3
summary
PrestaShop XSS can be stored in DB from "add a message form" in order detail page (FO)
### Impact
The isCleanHtml method is not used on this this form, which makes it possible to store an xss in DB.
The impact is low because the html is not interpreted in BO, thanks to twig's escape mechanism.
In FO, the xss is effective, but only impacts the customer sending it, or the customer session from which it was sent.

Be careful if you have a module fetching these messages from the DB and displaying it without escaping html.

### Patches
8.1.x

### Reporter
Reported by Rona Febriana (linkedin: https://www.linkedin.com/in/rona-febriana/)
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21628
reference_id
reference_type
scores
0
value 0.00384
scoring_system epss
scoring_elements 0.59683
published_at 2026-04-09T12:55:00Z
1
value 0.00384
scoring_system epss
scoring_elements 0.59707
published_at 2026-04-18T12:55:00Z
2
value 0.00384
scoring_system epss
scoring_elements 0.59699
published_at 2026-04-16T12:55:00Z
3
value 0.00384
scoring_system epss
scoring_elements 0.59666
published_at 2026-04-13T12:55:00Z
4
value 0.00384
scoring_system epss
scoring_elements 0.59685
published_at 2026-04-12T12:55:00Z
5
value 0.00384
scoring_system epss
scoring_elements 0.59702
published_at 2026-04-11T12:55:00Z
6
value 0.00384
scoring_system epss
scoring_elements 0.59624
published_at 2026-04-02T12:55:00Z
7
value 0.00384
scoring_system epss
scoring_elements 0.59649
published_at 2026-04-04T12:55:00Z
8
value 0.00384
scoring_system epss
scoring_elements 0.59619
published_at 2026-04-07T12:55:00Z
9
value 0.00384
scoring_system epss
scoring_elements 0.5967
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21628
1
reference_url https://github.com/PrestaShop/PrestaShop
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/PrestaShop/PrestaShop
2
reference_url https://github.com/PrestaShop/PrestaShop/commit/afc45b93b3cc33be0e571559d2838c6960d98856
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/PrestaShop/PrestaShop/commit/afc45b93b3cc33be0e571559d2838c6960d98856
3
reference_url https://github.com/PrestaShop/PrestaShop/commit/c3d78b7e49f5fe49a9d07725c3174d005deaa597
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-16T16:32:28Z/
url https://github.com/PrestaShop/PrestaShop/commit/c3d78b7e49f5fe49a9d07725c3174d005deaa597
4
reference_url https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-vr7m-r9vm-m4wf
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:L
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-16T16:32:28Z/
url https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-vr7m-r9vm-m4wf
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-21628
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-21628
6
reference_url https://github.com/advisories/GHSA-vr7m-r9vm-m4wf
reference_id GHSA-vr7m-r9vm-m4wf
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-vr7m-r9vm-m4wf
fixed_packages
0
url pkg:composer/prestashop/prestashop@8.1.3
purl pkg:composer/prestashop/prestashop@8.1.3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1trs-ajxn-jkhk
1
vulnerability VCID-5s8z-4eqn-p7h7
2
vulnerability VCID-cf1h-m5xj-mfc5
3
vulnerability VCID-ws23-cmum-kyh6
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/prestashop/prestashop@8.1.3
aliases CVE-2024-21628, GHSA-vr7m-r9vm-m4wf
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f4m9-pgg8-nqa3
12
url VCID-f7s4-16b7-zkcm
vulnerability_id VCID-f7s4-16b7-zkcm
summary
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
PrestaShop is an open source e-commerce web application. Versions prior to 1.7.8.10, 8.0.5, and 8.1.1 is vulnerable to remote code execution through SQL injection and arbitrary file write in the back office. Versions 1.7.8.10, 8.0.5, and 8.1.1 contain a patch. There are no known workarounds.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-39526
reference_id
reference_type
scores
0
value 0.10781
scoring_system epss
scoring_elements 0.93328
published_at 2026-04-07T12:55:00Z
1
value 0.10781
scoring_system epss
scoring_elements 0.93368
published_at 2026-04-18T12:55:00Z
2
value 0.10781
scoring_system epss
scoring_elements 0.93363
published_at 2026-04-16T12:55:00Z
3
value 0.10781
scoring_system epss
scoring_elements 0.93345
published_at 2026-04-13T12:55:00Z
4
value 0.10781
scoring_system epss
scoring_elements 0.93344
published_at 2026-04-12T12:55:00Z
5
value 0.10781
scoring_system epss
scoring_elements 0.93346
published_at 2026-04-11T12:55:00Z
6
value 0.10781
scoring_system epss
scoring_elements 0.93341
published_at 2026-04-09T12:55:00Z
7
value 0.10781
scoring_system epss
scoring_elements 0.93323
published_at 2026-04-02T12:55:00Z
8
value 0.10781
scoring_system epss
scoring_elements 0.93329
published_at 2026-04-04T12:55:00Z
9
value 0.10781
scoring_system epss
scoring_elements 0.93337
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-39526
1
reference_url https://github.com/PrestaShop/PrestaShop
reference_id
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/PrestaShop/PrestaShop
2
reference_url https://github.com/PrestaShop/PrestaShop/commit/817847e2347844a9b6add017581f1932bcd28c09
reference_id
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-10T19:05:56Z/
url https://github.com/PrestaShop/PrestaShop/commit/817847e2347844a9b6add017581f1932bcd28c09
3
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-39526
reference_id CVE-2023-39526
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-39526
4
reference_url https://github.com/advisories/GHSA-gf46-prm4-56pc
reference_id GHSA-gf46-prm4-56pc
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-gf46-prm4-56pc
5
reference_url https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-gf46-prm4-56pc
reference_id GHSA-gf46-prm4-56pc
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
2
value CRITICAL
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-10T19:05:56Z/
url https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-gf46-prm4-56pc
fixed_packages
0
url pkg:composer/prestashop/prestashop@1.7.8%2B10
purl pkg:composer/prestashop/prestashop@1.7.8%2B10
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/prestashop/prestashop@1.7.8%252B10
1
url pkg:composer/prestashop/prestashop@1.7.8.10
purl pkg:composer/prestashop/prestashop@1.7.8.10
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1trs-ajxn-jkhk
1
vulnerability VCID-22v3-9qr1-pyfg
2
vulnerability VCID-7wj5-37ma-hbhg
3
vulnerability VCID-8beq-8rca-mbhd
4
vulnerability VCID-c4g5-t8vx-syax
5
vulnerability VCID-cf1h-m5xj-mfc5
6
vulnerability VCID-ey36-u4qn-gbge
7
vulnerability VCID-f4m9-pgg8-nqa3
8
vulnerability VCID-fkcb-5u24-wqbg
9
vulnerability VCID-keyj-v83x-nkck
10
vulnerability VCID-mb3x-p2d7-gqdx
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/prestashop/prestashop@1.7.8.10
2
url pkg:composer/prestashop/prestashop@8.0.5
purl pkg:composer/prestashop/prestashop@8.0.5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1trs-ajxn-jkhk
1
vulnerability VCID-22v3-9qr1-pyfg
2
vulnerability VCID-7wj5-37ma-hbhg
3
vulnerability VCID-8beq-8rca-mbhd
4
vulnerability VCID-c4g5-t8vx-syax
5
vulnerability VCID-cf1h-m5xj-mfc5
6
vulnerability VCID-ey36-u4qn-gbge
7
vulnerability VCID-f4m9-pgg8-nqa3
8
vulnerability VCID-fkcb-5u24-wqbg
9
vulnerability VCID-keyj-v83x-nkck
10
vulnerability VCID-mb3x-p2d7-gqdx
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/prestashop/prestashop@8.0.5
3
url pkg:composer/prestashop/prestashop@8.1.1
purl pkg:composer/prestashop/prestashop@8.1.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1trs-ajxn-jkhk
1
vulnerability VCID-5s8z-4eqn-p7h7
2
vulnerability VCID-cf1h-m5xj-mfc5
3
vulnerability VCID-ey36-u4qn-gbge
4
vulnerability VCID-f4m9-pgg8-nqa3
5
vulnerability VCID-fkcb-5u24-wqbg
6
vulnerability VCID-keyj-v83x-nkck
7
vulnerability VCID-ws23-cmum-kyh6
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/prestashop/prestashop@8.1.1
aliases CVE-2023-39526, GHSA-gf46-prm4-56pc
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f7s4-16b7-zkcm
13
url VCID-fkcb-5u24-wqbg
vulnerability_id VCID-fkcb-5u24-wqbg
summary
PrestaShop some attribute not escaped in Validate::isCleanHTML method
### Description
Some event attributes are not detected by the isCleanHTML method

### Impact
Some modules using the isCleanHTML method could be vulnerable to xss

### Patches
8.1.3, 1.7.8.11

### Workarounds
The best workaround is to use the `HTMLPurifier` library to sanitize html input coming from users. The library is already available as a dependency in the PrestaShop project. Beware though that in legacy object models, fields of `HTML` type will call `isCleanHTML`.

### Reporters

Reported by Antonio Russo (@Antonio-R1 on GitHub) and Antonio Rocco Spataro (@antoniospataro on GitHub).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-21627
reference_id
reference_type
scores
0
value 0.0095
scoring_system epss
scoring_elements 0.76367
published_at 2026-04-09T12:55:00Z
1
value 0.0095
scoring_system epss
scoring_elements 0.76413
published_at 2026-04-18T12:55:00Z
2
value 0.0095
scoring_system epss
scoring_elements 0.76406
published_at 2026-04-16T12:55:00Z
3
value 0.0095
scoring_system epss
scoring_elements 0.76366
published_at 2026-04-13T12:55:00Z
4
value 0.0095
scoring_system epss
scoring_elements 0.76371
published_at 2026-04-12T12:55:00Z
5
value 0.0095
scoring_system epss
scoring_elements 0.76393
published_at 2026-04-11T12:55:00Z
6
value 0.0095
scoring_system epss
scoring_elements 0.76311
published_at 2026-04-02T12:55:00Z
7
value 0.0095
scoring_system epss
scoring_elements 0.76341
published_at 2026-04-04T12:55:00Z
8
value 0.0095
scoring_system epss
scoring_elements 0.76321
published_at 2026-04-07T12:55:00Z
9
value 0.0095
scoring_system epss
scoring_elements 0.76354
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-21627
1
reference_url https://github.com/PrestaShop/PrestaShop
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/PrestaShop/PrestaShop
2
reference_url https://github.com/PrestaShop/PrestaShop/commit/0ed1af8de500538490f88e9e794e2e8113fb8df7
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/PrestaShop/PrestaShop/commit/0ed1af8de500538490f88e9e794e2e8113fb8df7
3
reference_url https://github.com/PrestaShop/PrestaShop/commit/73cfb44666818eefd501b526a894fe884dd12129
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-08T15:48:20Z/
url https://github.com/PrestaShop/PrestaShop/commit/73cfb44666818eefd501b526a894fe884dd12129
4
reference_url https://github.com/PrestaShop/PrestaShop/commit/ba06d18466df5b92cb841d504cc7210121104883
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-08T15:48:20Z/
url https://github.com/PrestaShop/PrestaShop/commit/ba06d18466df5b92cb841d504cc7210121104883
5
reference_url https://github.com/PrestaShop/PrestaShop/commit/f799dcff564cd1b7ead932ffc3343b675107dbce
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/PrestaShop/PrestaShop/commit/f799dcff564cd1b7ead932ffc3343b675107dbce
6
reference_url https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-xgpm-q3mq-46rq
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:N
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-08T15:48:20Z/
url https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-xgpm-q3mq-46rq
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-21627
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-21627
8
reference_url https://github.com/advisories/GHSA-xgpm-q3mq-46rq
reference_id GHSA-xgpm-q3mq-46rq
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-xgpm-q3mq-46rq
fixed_packages
0
url pkg:composer/prestashop/prestashop@1.7.8%2B11
purl pkg:composer/prestashop/prestashop@1.7.8%2B11
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/prestashop/prestashop@1.7.8%252B11
1
url pkg:composer/prestashop/prestashop@1.7.8.11
purl pkg:composer/prestashop/prestashop@1.7.8.11
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1trs-ajxn-jkhk
1
vulnerability VCID-cf1h-m5xj-mfc5
2
vulnerability VCID-f4m9-pgg8-nqa3
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/prestashop/prestashop@1.7.8.11
2
url pkg:composer/prestashop/prestashop@8.1.3
purl pkg:composer/prestashop/prestashop@8.1.3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1trs-ajxn-jkhk
1
vulnerability VCID-5s8z-4eqn-p7h7
2
vulnerability VCID-cf1h-m5xj-mfc5
3
vulnerability VCID-ws23-cmum-kyh6
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/prestashop/prestashop@8.1.3
aliases CVE-2024-21627, GHSA-xgpm-q3mq-46rq
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fkcb-5u24-wqbg
14
url VCID-gggb-dges-qke1
vulnerability_id VCID-gggb-dges-qke1
summary
Cross-Site Request Forgery (CSRF)
PrestaShop is an open source e-commerce web application that, prior to version 8.0.1, is vulnerable to cross-site request forgery (CSRF). When authenticating users, PrestaShop preserves session attributes. Because this does not clear CSRF tokens upon login, this might enable same-site attackers to bypass the CSRF protection mechanism by performing an attack similar to a session-fixation. The problem is fixed in version 8.0.1.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-25170
reference_id
reference_type
scores
0
value 0.00067
scoring_system epss
scoring_elements 0.20867
published_at 2026-04-04T12:55:00Z
1
value 0.00067
scoring_system epss
scoring_elements 0.20809
published_at 2026-04-02T12:55:00Z
2
value 0.00091
scoring_system epss
scoring_elements 0.25633
published_at 2026-04-16T12:55:00Z
3
value 0.00091
scoring_system epss
scoring_elements 0.25632
published_at 2026-04-13T12:55:00Z
4
value 0.00091
scoring_system epss
scoring_elements 0.25689
published_at 2026-04-12T12:55:00Z
5
value 0.00091
scoring_system epss
scoring_elements 0.25599
published_at 2026-04-07T12:55:00Z
6
value 0.00091
scoring_system epss
scoring_elements 0.2573
published_at 2026-04-11T12:55:00Z
7
value 0.00091
scoring_system epss
scoring_elements 0.25617
published_at 2026-04-18T12:55:00Z
8
value 0.00091
scoring_system epss
scoring_elements 0.25718
published_at 2026-04-09T12:55:00Z
9
value 0.00091
scoring_system epss
scoring_elements 0.25672
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-25170
1
reference_url https://github.com/PrestaShop/PrestaShop
reference_id
reference_type
scores
0
value 5.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/PrestaShop/PrestaShop
2
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-25170
reference_id CVE-2023-25170
reference_type
scores
0
value 5.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-25170
3
reference_url https://github.com/advisories/GHSA-3g43-x7qr-96ph
reference_id GHSA-3g43-x7qr-96ph
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-3g43-x7qr-96ph
4
reference_url https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-3g43-x7qr-96ph
reference_id GHSA-3g43-x7qr-96ph
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value 5.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
2
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-25T14:29:46Z/
url https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-3g43-x7qr-96ph
fixed_packages
0
url pkg:composer/prestashop/prestashop@8.0.1
purl pkg:composer/prestashop/prestashop@8.0.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1trs-ajxn-jkhk
1
vulnerability VCID-22v3-9qr1-pyfg
2
vulnerability VCID-2kkx-8ucb-7ucj
3
vulnerability VCID-45hk-m7uv-zqfe
4
vulnerability VCID-7wj5-37ma-hbhg
5
vulnerability VCID-8beq-8rca-mbhd
6
vulnerability VCID-9n6p-8b89-63c6
7
vulnerability VCID-c4g5-t8vx-syax
8
vulnerability VCID-cf1h-m5xj-mfc5
9
vulnerability VCID-ey36-u4qn-gbge
10
vulnerability VCID-f4m9-pgg8-nqa3
11
vulnerability VCID-f7s4-16b7-zkcm
12
vulnerability VCID-fkcb-5u24-wqbg
13
vulnerability VCID-keyj-v83x-nkck
14
vulnerability VCID-kwe1-5ukw-cbau
15
vulnerability VCID-mb3x-p2d7-gqdx
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/prestashop/prestashop@8.0.1
aliases CVE-2023-25170, GHSA-3g43-x7qr-96ph
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gggb-dges-qke1
15
url VCID-ghu1-c6e6-pudm
vulnerability_id VCID-ghu1-c6e6-pudm
summary
Improper Control of Generation of Code ('Code Injection')
PrestaShop is an Open Source e-commerce platform. Starting with version 1.7.0.0 and ending with version 1.7.8.3, an attacker is able to inject twig code inside the back office when using the legacy layout. The problem is fixed in version 1.7.8.3. There are no known workarounds.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21686
reference_id
reference_type
scores
0
value 0.0051
scoring_system epss
scoring_elements 0.66352
published_at 2026-04-02T12:55:00Z
1
value 0.0051
scoring_system epss
scoring_elements 0.6644
published_at 2026-04-18T12:55:00Z
2
value 0.0051
scoring_system epss
scoring_elements 0.66423
published_at 2026-04-16T12:55:00Z
3
value 0.0051
scoring_system epss
scoring_elements 0.66387
published_at 2026-04-13T12:55:00Z
4
value 0.0051
scoring_system epss
scoring_elements 0.66418
published_at 2026-04-12T12:55:00Z
5
value 0.0051
scoring_system epss
scoring_elements 0.6643
published_at 2026-04-11T12:55:00Z
6
value 0.0051
scoring_system epss
scoring_elements 0.6641
published_at 2026-04-09T12:55:00Z
7
value 0.0051
scoring_system epss
scoring_elements 0.66396
published_at 2026-04-08T12:55:00Z
8
value 0.0051
scoring_system epss
scoring_elements 0.66348
published_at 2026-04-07T12:55:00Z
9
value 0.0051
scoring_system epss
scoring_elements 0.66379
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21686
1
reference_url https://github.com/PrestaShop/PrestaShop
reference_id
reference_type
scores
0
value 9.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/PrestaShop/PrestaShop
2
reference_url https://github.com/PrestaShop/PrestaShop/commit/d02b469ec365822e6a9f017e57f588966248bf21
reference_id
reference_type
scores
0
value 9.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/PrestaShop/PrestaShop/commit/d02b469ec365822e6a9f017e57f588966248bf21
3
reference_url https://github.com/PrestaShop/PrestaShop/releases/tag/1.7.8.3
reference_id
reference_type
scores
0
value 9.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/PrestaShop/PrestaShop/releases/tag/1.7.8.3
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-21686
reference_id CVE-2022-21686
reference_type
scores
0
value 9.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-21686
5
reference_url https://github.com/advisories/GHSA-mrq4-7ch7-2465
reference_id GHSA-mrq4-7ch7-2465
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-mrq4-7ch7-2465
6
reference_url https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-mrq4-7ch7-2465
reference_id GHSA-mrq4-7ch7-2465
reference_type
scores
0
value 9.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-mrq4-7ch7-2465
fixed_packages
0
url pkg:composer/prestashop/prestashop@1.7.8%2B3
purl pkg:composer/prestashop/prestashop@1.7.8%2B3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/prestashop/prestashop@1.7.8%252B3
1
url pkg:composer/prestashop/prestashop@1.7.8.3
purl pkg:composer/prestashop/prestashop@1.7.8.3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1trs-ajxn-jkhk
1
vulnerability VCID-22v3-9qr1-pyfg
2
vulnerability VCID-2kkx-8ucb-7ucj
3
vulnerability VCID-45hk-m7uv-zqfe
4
vulnerability VCID-7wj5-37ma-hbhg
5
vulnerability VCID-8beq-8rca-mbhd
6
vulnerability VCID-9n6p-8b89-63c6
7
vulnerability VCID-c4g5-t8vx-syax
8
vulnerability VCID-cf1h-m5xj-mfc5
9
vulnerability VCID-ey36-u4qn-gbge
10
vulnerability VCID-f4m9-pgg8-nqa3
11
vulnerability VCID-gggb-dges-qke1
12
vulnerability VCID-htkt-tj6d-hydx
13
vulnerability VCID-keyj-v83x-nkck
14
vulnerability VCID-mb3x-p2d7-gqdx
15
vulnerability VCID-vcuy-9cdj-uyhz
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/prestashop/prestashop@1.7.8.3
aliases CVE-2022-21686, GHSA-mrq4-7ch7-2465
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ghu1-c6e6-pudm
16
url VCID-htkt-tj6d-hydx
vulnerability_id VCID-htkt-tj6d-hydx
summary
PrestaShop has potential Information exposure in the upload directory
### Impact
Potential Information exposure in the upload directory.

### Patches
Patch in PrestaShop 1.7.8.8

### References
https://capec.mitre.org/data/definitions/87.html

Thanks to DZPATROL
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-46158
reference_id
reference_type
scores
0
value 0.0007
scoring_system epss
scoring_elements 0.21521
published_at 2026-04-02T12:55:00Z
1
value 0.0007
scoring_system epss
scoring_elements 0.21392
published_at 2026-04-18T12:55:00Z
2
value 0.0007
scoring_system epss
scoring_elements 0.21385
published_at 2026-04-16T12:55:00Z
3
value 0.0007
scoring_system epss
scoring_elements 0.2139
published_at 2026-04-13T12:55:00Z
4
value 0.0007
scoring_system epss
scoring_elements 0.21446
published_at 2026-04-12T12:55:00Z
5
value 0.0007
scoring_system epss
scoring_elements 0.21485
published_at 2026-04-11T12:55:00Z
6
value 0.0007
scoring_system epss
scoring_elements 0.21473
published_at 2026-04-09T12:55:00Z
7
value 0.0007
scoring_system epss
scoring_elements 0.21335
published_at 2026-04-07T12:55:00Z
8
value 0.0007
scoring_system epss
scoring_elements 0.2158
published_at 2026-04-04T12:55:00Z
9
value 0.0007
scoring_system epss
scoring_elements 0.21413
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-46158
1
reference_url https://github.com/PrestaShop/PrestaShop
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/PrestaShop/PrestaShop
2
reference_url https://github.com/PrestaShop/PrestaShop/commit/8684d429fb7c3bb51efb098e8b92a1fd2958f8cf
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:47:57Z/
url https://github.com/PrestaShop/PrestaShop/commit/8684d429fb7c3bb51efb098e8b92a1fd2958f8cf
3
reference_url https://github.com/PrestaShop/PrestaShop/releases/tag/1.7.8.8
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/PrestaShop/PrestaShop/releases/tag/1.7.8.8
4
reference_url https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-9qgp-9wwc-v29r
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
2
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:47:57Z/
url https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-9qgp-9wwc-v29r
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-46158
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-46158
6
reference_url https://github.com/advisories/GHSA-9qgp-9wwc-v29r
reference_id GHSA-9qgp-9wwc-v29r
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-9qgp-9wwc-v29r
fixed_packages
0
url pkg:composer/prestashop/prestashop@1.7.8.8
purl pkg:composer/prestashop/prestashop@1.7.8.8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1trs-ajxn-jkhk
1
vulnerability VCID-22v3-9qr1-pyfg
2
vulnerability VCID-2kkx-8ucb-7ucj
3
vulnerability VCID-45hk-m7uv-zqfe
4
vulnerability VCID-7wj5-37ma-hbhg
5
vulnerability VCID-8beq-8rca-mbhd
6
vulnerability VCID-9n6p-8b89-63c6
7
vulnerability VCID-c4g5-t8vx-syax
8
vulnerability VCID-cf1h-m5xj-mfc5
9
vulnerability VCID-ey36-u4qn-gbge
10
vulnerability VCID-f4m9-pgg8-nqa3
11
vulnerability VCID-gggb-dges-qke1
12
vulnerability VCID-keyj-v83x-nkck
13
vulnerability VCID-mb3x-p2d7-gqdx
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/prestashop/prestashop@1.7.8.8
1
url pkg:composer/prestashop/prestashop@1.7.8%2B8
purl pkg:composer/prestashop/prestashop@1.7.8%2B8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/prestashop/prestashop@1.7.8%252B8
aliases CVE-2022-46158, GHSA-9qgp-9wwc-v29r, GMS-2022-8006
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-htkt-tj6d-hydx
17
url VCID-keyj-v83x-nkck
vulnerability_id VCID-keyj-v83x-nkck
summary
Improper Privilege Management
PrestaShop is an Open Source e-commerce web application. In affected versions any module can be disabled or uninstalled from back office, even with low user right. This allows low privileged users to disable portions of a shops functionality. Commit `ce1f6708` addresses this issue and is included in version 8.1.2. Users are advised to upgrade. There are no known workarounds for this issue.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-43663
reference_id
reference_type
scores
0
value 0.00102
scoring_system epss
scoring_elements 0.28015
published_at 2026-04-07T12:55:00Z
1
value 0.00102
scoring_system epss
scoring_elements 0.28023
published_at 2026-04-18T12:55:00Z
2
value 0.00102
scoring_system epss
scoring_elements 0.2804
published_at 2026-04-16T12:55:00Z
3
value 0.00102
scoring_system epss
scoring_elements 0.28031
published_at 2026-04-13T12:55:00Z
4
value 0.00102
scoring_system epss
scoring_elements 0.28088
published_at 2026-04-12T12:55:00Z
5
value 0.00102
scoring_system epss
scoring_elements 0.28132
published_at 2026-04-11T12:55:00Z
6
value 0.00102
scoring_system epss
scoring_elements 0.28125
published_at 2026-04-09T12:55:00Z
7
value 0.00102
scoring_system epss
scoring_elements 0.28177
published_at 2026-04-02T12:55:00Z
8
value 0.00102
scoring_system epss
scoring_elements 0.2822
published_at 2026-04-04T12:55:00Z
9
value 0.00102
scoring_system epss
scoring_elements 0.28082
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-43663
1
reference_url https://github.com/PrestaShop/PrestaShop
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/PrestaShop/PrestaShop
2
reference_url https://github.com/PrestaShop/PrestaShop/commit/ce1f67083537194e974caf86c57e547a0aaa46cd
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-20T17:48:09Z/
url https://github.com/PrestaShop/PrestaShop/commit/ce1f67083537194e974caf86c57e547a0aaa46cd
3
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-43663
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-43663
4
reference_url https://github.com/advisories/GHSA-6jmf-2pfc-q9m7
reference_id GHSA-6jmf-2pfc-q9m7
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-6jmf-2pfc-q9m7
5
reference_url https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-6jmf-2pfc-q9m7
reference_id GHSA-6jmf-2pfc-q9m7
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
2
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
3
value MODERATE
scoring_system generic_textual
scoring_elements
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-20T17:48:09Z/
url https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-6jmf-2pfc-q9m7
fixed_packages
0
url pkg:composer/prestashop/prestashop@8.1.2
purl pkg:composer/prestashop/prestashop@8.1.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1trs-ajxn-jkhk
1
vulnerability VCID-5s8z-4eqn-p7h7
2
vulnerability VCID-cf1h-m5xj-mfc5
3
vulnerability VCID-f4m9-pgg8-nqa3
4
vulnerability VCID-fkcb-5u24-wqbg
5
vulnerability VCID-ws23-cmum-kyh6
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/prestashop/prestashop@8.1.2
aliases CVE-2023-43663, GHSA-6jmf-2pfc-q9m7
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-keyj-v83x-nkck
18
url VCID-kwe1-5ukw-cbau
vulnerability_id VCID-kwe1-5ukw-cbau
summary
Improper Encoding or Escaping of Output
PrestaShop is an open source e-commerce web application. Versions prior to 1.7.8.10, 8.0.5, and 8.1.1 is vulnerable to cross-site scripting through the `isCleanHTML` method. Versions 1.7.8.10, 8.0.5, and 8.1.1 contain a patch. There are no known workarounds.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-39527
reference_id
reference_type
scores
0
value 0.01508
scoring_system epss
scoring_elements 0.81149
published_at 2026-04-07T12:55:00Z
1
value 0.01508
scoring_system epss
scoring_elements 0.8122
published_at 2026-04-18T12:55:00Z
2
value 0.01508
scoring_system epss
scoring_elements 0.81219
published_at 2026-04-16T12:55:00Z
3
value 0.01508
scoring_system epss
scoring_elements 0.81181
published_at 2026-04-13T12:55:00Z
4
value 0.01508
scoring_system epss
scoring_elements 0.81189
published_at 2026-04-12T12:55:00Z
5
value 0.01508
scoring_system epss
scoring_elements 0.81202
published_at 2026-04-11T12:55:00Z
6
value 0.01508
scoring_system epss
scoring_elements 0.81183
published_at 2026-04-09T12:55:00Z
7
value 0.01508
scoring_system epss
scoring_elements 0.81126
published_at 2026-04-02T12:55:00Z
8
value 0.01508
scoring_system epss
scoring_elements 0.8115
published_at 2026-04-04T12:55:00Z
9
value 0.01508
scoring_system epss
scoring_elements 0.81177
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-39527
1
reference_url https://github.com/PrestaShop/PrestaShop
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/PrestaShop/PrestaShop
2
reference_url https://github.com/PrestaShop/PrestaShop/commit/afc14f8eaa058b3e6a20ac43e033ee2656fb88b4
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T16:01:22Z/
url https://github.com/PrestaShop/PrestaShop/commit/afc14f8eaa058b3e6a20ac43e033ee2656fb88b4
3
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-39527
reference_id CVE-2023-39527
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-39527
4
reference_url https://github.com/advisories/GHSA-xw2r-f8xv-c8xp
reference_id GHSA-xw2r-f8xv-c8xp
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-xw2r-f8xv-c8xp
5
reference_url https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-xw2r-f8xv-c8xp
reference_id GHSA-xw2r-f8xv-c8xp
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:H/A:H
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T16:01:22Z/
url https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-xw2r-f8xv-c8xp
fixed_packages
0
url pkg:composer/prestashop/prestashop@1.7.8%2B10
purl pkg:composer/prestashop/prestashop@1.7.8%2B10
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/prestashop/prestashop@1.7.8%252B10
1
url pkg:composer/prestashop/prestashop@1.7.8.10
purl pkg:composer/prestashop/prestashop@1.7.8.10
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1trs-ajxn-jkhk
1
vulnerability VCID-22v3-9qr1-pyfg
2
vulnerability VCID-7wj5-37ma-hbhg
3
vulnerability VCID-8beq-8rca-mbhd
4
vulnerability VCID-c4g5-t8vx-syax
5
vulnerability VCID-cf1h-m5xj-mfc5
6
vulnerability VCID-ey36-u4qn-gbge
7
vulnerability VCID-f4m9-pgg8-nqa3
8
vulnerability VCID-fkcb-5u24-wqbg
9
vulnerability VCID-keyj-v83x-nkck
10
vulnerability VCID-mb3x-p2d7-gqdx
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/prestashop/prestashop@1.7.8.10
2
url pkg:composer/prestashop/prestashop@8.0.5
purl pkg:composer/prestashop/prestashop@8.0.5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1trs-ajxn-jkhk
1
vulnerability VCID-22v3-9qr1-pyfg
2
vulnerability VCID-7wj5-37ma-hbhg
3
vulnerability VCID-8beq-8rca-mbhd
4
vulnerability VCID-c4g5-t8vx-syax
5
vulnerability VCID-cf1h-m5xj-mfc5
6
vulnerability VCID-ey36-u4qn-gbge
7
vulnerability VCID-f4m9-pgg8-nqa3
8
vulnerability VCID-fkcb-5u24-wqbg
9
vulnerability VCID-keyj-v83x-nkck
10
vulnerability VCID-mb3x-p2d7-gqdx
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/prestashop/prestashop@8.0.5
3
url pkg:composer/prestashop/prestashop@8.1.1
purl pkg:composer/prestashop/prestashop@8.1.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1trs-ajxn-jkhk
1
vulnerability VCID-5s8z-4eqn-p7h7
2
vulnerability VCID-cf1h-m5xj-mfc5
3
vulnerability VCID-ey36-u4qn-gbge
4
vulnerability VCID-f4m9-pgg8-nqa3
5
vulnerability VCID-fkcb-5u24-wqbg
6
vulnerability VCID-keyj-v83x-nkck
7
vulnerability VCID-ws23-cmum-kyh6
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/prestashop/prestashop@8.1.1
aliases CVE-2023-39527, GHSA-xw2r-f8xv-c8xp
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kwe1-5ukw-cbau
19
url VCID-mb3x-p2d7-gqdx
vulnerability_id VCID-mb3x-p2d7-gqdx
summary
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
PrestaShop is an open source e-commerce web application. Prior to version 8.1.1, in the back office, files can be compromised using path traversal by replaying the import file deletion query with a specified file path that uses the traversal path. Version 8.1.1 contains a patch for this issue. There are no known workarounds.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-39525
reference_id
reference_type
scores
0
value 0.01261
scoring_system epss
scoring_elements 0.79389
published_at 2026-04-07T12:55:00Z
1
value 0.01261
scoring_system epss
scoring_elements 0.7938
published_at 2026-04-02T12:55:00Z
2
value 0.01261
scoring_system epss
scoring_elements 0.79402
published_at 2026-04-04T12:55:00Z
3
value 0.01261
scoring_system epss
scoring_elements 0.79451
published_at 2026-04-18T12:55:00Z
4
value 0.01261
scoring_system epss
scoring_elements 0.79453
published_at 2026-04-16T12:55:00Z
5
value 0.01261
scoring_system epss
scoring_elements 0.79422
published_at 2026-04-13T12:55:00Z
6
value 0.01261
scoring_system epss
scoring_elements 0.79432
published_at 2026-04-12T12:55:00Z
7
value 0.01261
scoring_system epss
scoring_elements 0.79449
published_at 2026-04-11T12:55:00Z
8
value 0.01261
scoring_system epss
scoring_elements 0.79426
published_at 2026-04-09T12:55:00Z
9
value 0.01261
scoring_system epss
scoring_elements 0.79416
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-39525
1
reference_url https://github.com/PrestaShop/PrestaShop
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/PrestaShop/PrestaShop
2
reference_url https://github.com/PrestaShop/PrestaShop/commit/c7c9a5110421bb2856f4d312ecce192d079b5ec7
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T16:19:54Z/
url https://github.com/PrestaShop/PrestaShop/commit/c7c9a5110421bb2856f4d312ecce192d079b5ec7
3
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-39525
reference_id CVE-2023-39525
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-39525
4
reference_url https://github.com/advisories/GHSA-m9r4-3fg7-pqm2
reference_id GHSA-m9r4-3fg7-pqm2
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-m9r4-3fg7-pqm2
5
reference_url https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-m9r4-3fg7-pqm2
reference_id GHSA-m9r4-3fg7-pqm2
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-03T16:19:54Z/
url https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-m9r4-3fg7-pqm2
fixed_packages
0
url pkg:composer/prestashop/prestashop@8.1.1
purl pkg:composer/prestashop/prestashop@8.1.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1trs-ajxn-jkhk
1
vulnerability VCID-5s8z-4eqn-p7h7
2
vulnerability VCID-cf1h-m5xj-mfc5
3
vulnerability VCID-ey36-u4qn-gbge
4
vulnerability VCID-f4m9-pgg8-nqa3
5
vulnerability VCID-fkcb-5u24-wqbg
6
vulnerability VCID-keyj-v83x-nkck
7
vulnerability VCID-ws23-cmum-kyh6
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/prestashop/prestashop@8.1.1
aliases CVE-2023-39525, GHSA-m9r4-3fg7-pqm2
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mb3x-p2d7-gqdx
20
url VCID-qx7c-y2p8-vye9
vulnerability_id VCID-qx7c-y2p8-vye9
summary
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
A cross-site scripting (XSS) vulnerability in PrestaShop v1.7.7.4 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the message parameter in /contactform/contactform.php.
references
0
reference_url https://github.com/mustgundogdu/Research/blob/main/PrestaShop/ReflectedXSS_1.7.7.4.md
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/mustgundogdu/Research/blob/main/PrestaShop/ReflectedXSS_1.7.7.4.md
1
reference_url https://github.com/PrestaShop/PrestaShop
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/PrestaShop/PrestaShop
2
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-31508
reference_id CVE-2023-31508
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-31508
3
reference_url https://github.com/advisories/GHSA-6mhc-hqr3-w466
reference_id GHSA-6mhc-hqr3-w466
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-6mhc-hqr3-w466
fixed_packages
0
url pkg:composer/prestashop/prestashop@1.7.7.5
purl pkg:composer/prestashop/prestashop@1.7.7.5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1trs-ajxn-jkhk
1
vulnerability VCID-22v3-9qr1-pyfg
2
vulnerability VCID-2kkx-8ucb-7ucj
3
vulnerability VCID-45hk-m7uv-zqfe
4
vulnerability VCID-7wj5-37ma-hbhg
5
vulnerability VCID-8beq-8rca-mbhd
6
vulnerability VCID-9n6p-8b89-63c6
7
vulnerability VCID-bmyy-gqbc-ybhz
8
vulnerability VCID-c4g5-t8vx-syax
9
vulnerability VCID-cf1h-m5xj-mfc5
10
vulnerability VCID-ey36-u4qn-gbge
11
vulnerability VCID-f4m9-pgg8-nqa3
12
vulnerability VCID-f7s4-16b7-zkcm
13
vulnerability VCID-fkcb-5u24-wqbg
14
vulnerability VCID-gggb-dges-qke1
15
vulnerability VCID-ghu1-c6e6-pudm
16
vulnerability VCID-htkt-tj6d-hydx
17
vulnerability VCID-keyj-v83x-nkck
18
vulnerability VCID-kwe1-5ukw-cbau
19
vulnerability VCID-mb3x-p2d7-gqdx
20
vulnerability VCID-vcuy-9cdj-uyhz
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/prestashop/prestashop@1.7.7.5
aliases CVE-2023-31508, GHSA-6mhc-hqr3-w466
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qx7c-y2p8-vye9
21
url VCID-vcuy-9cdj-uyhz
vulnerability_id VCID-vcuy-9cdj-uyhz
summary
PrestaShop eval injection possible if shop vulnerable to SQL injection
### Impact
Eval injection possible if the shop is vulnerable to an SQL injection.

### Patches
The problem is fixed in version 1.7.8.7

### Workarounds
Delete the MySQL Smarty cache feature by removing these lines in the file `config/smarty.config.inc.php` lines 43-46 (PrestaShop 1.7) or 40-43 (PrestaShop 1.6):
```php
if (Configuration::get('PS_SMARTY_CACHING_TYPE') == 'mysql') {
    include _PS_CLASS_DIR_.'Smarty/SmartyCacheResourceMysql.php';
    $smarty->caching_type = 'mysql';
}
```
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-31181
reference_id
reference_type
scores
0
value 0.78272
scoring_system epss
scoring_elements 0.99026
published_at 2026-04-18T12:55:00Z
1
value 0.78272
scoring_system epss
scoring_elements 0.99016
published_at 2026-04-02T12:55:00Z
2
value 0.78272
scoring_system epss
scoring_elements 0.99018
published_at 2026-04-04T12:55:00Z
3
value 0.78272
scoring_system epss
scoring_elements 0.9902
published_at 2026-04-07T12:55:00Z
4
value 0.78272
scoring_system epss
scoring_elements 0.99022
published_at 2026-04-08T12:55:00Z
5
value 0.78272
scoring_system epss
scoring_elements 0.99021
published_at 2026-04-09T12:55:00Z
6
value 0.78272
scoring_system epss
scoring_elements 0.99023
published_at 2026-04-11T12:55:00Z
7
value 0.78272
scoring_system epss
scoring_elements 0.99024
published_at 2026-04-13T12:55:00Z
8
value 0.78272
scoring_system epss
scoring_elements 0.99025
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-31181
1
reference_url https://github.com/PrestaShop/PrestaShop
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/PrestaShop/PrestaShop
2
reference_url https://github.com/PrestaShop/PrestaShop/commit/b6d96e7c2a4e35a44e96ffbcdfd34439b56af804
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:48:50Z/
url https://github.com/PrestaShop/PrestaShop/commit/b6d96e7c2a4e35a44e96ffbcdfd34439b56af804
3
reference_url https://github.com/PrestaShop/PrestaShop/releases/tag/1.7.8.7
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:48:50Z/
url https://github.com/PrestaShop/PrestaShop/releases/tag/1.7.8.7
4
reference_url https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-hrgx-p36p-89q4
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
2
value CRITICAL
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:48:50Z/
url https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-hrgx-p36p-89q4
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-31181
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-31181
6
reference_url https://github.com/advisories/GHSA-hrgx-p36p-89q4
reference_id GHSA-hrgx-p36p-89q4
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-hrgx-p36p-89q4
fixed_packages
0
url pkg:composer/prestashop/prestashop@1.7.8%2B7
purl pkg:composer/prestashop/prestashop@1.7.8%2B7
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/prestashop/prestashop@1.7.8%252B7
1
url pkg:composer/prestashop/prestashop@1.7.8.7
purl pkg:composer/prestashop/prestashop@1.7.8.7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1trs-ajxn-jkhk
1
vulnerability VCID-22v3-9qr1-pyfg
2
vulnerability VCID-2kkx-8ucb-7ucj
3
vulnerability VCID-45hk-m7uv-zqfe
4
vulnerability VCID-7wj5-37ma-hbhg
5
vulnerability VCID-8beq-8rca-mbhd
6
vulnerability VCID-9n6p-8b89-63c6
7
vulnerability VCID-c4g5-t8vx-syax
8
vulnerability VCID-cf1h-m5xj-mfc5
9
vulnerability VCID-ey36-u4qn-gbge
10
vulnerability VCID-f4m9-pgg8-nqa3
11
vulnerability VCID-gggb-dges-qke1
12
vulnerability VCID-htkt-tj6d-hydx
13
vulnerability VCID-keyj-v83x-nkck
14
vulnerability VCID-mb3x-p2d7-gqdx
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/prestashop/prestashop@1.7.8.7
aliases CVE-2022-31181, GHSA-hrgx-p36p-89q4, GMS-2022-3270
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vcuy-9cdj-uyhz
Fixing_vulnerabilities
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:composer/prestashop/prestashop@1.7.2.0