Lookup for vulnerable packages by Package URL.
| Purl | pkg:composer/prestashop/prestashop@8.1.3 |
| Type | composer |
| Namespace | prestashop |
| Name | prestashop |
| Version | 8.1.3 |
| Qualifiers |
|
| Subpath | |
| Is_vulnerable | true |
| Next_non_vulnerable_version | 8.2.4 |
| Latest_non_vulnerable_version | 9.1.0 |
| Affected_by_vulnerabilities |
| 0 |
| url |
VCID-1trs-ajxn-jkhk |
| vulnerability_id |
VCID-1trs-ajxn-jkhk |
| summary |
Presta Shop vulnerable to email enumeration
### Impact
An unauthenticated attacker with access to the back-office URL can manipulate the id_employee and reset_token parameters to enumerate valid back-office employee email addresses.
Impacted parties:
Store administrators and employees: their email addresses are exposed.
Merchants: risk of phishing, social engineering, and brute-force attacks targeting admin accounts.
### Patches
PrestaShop 8.2.3
### Workarounds
You must upgrade, or at least apply the changes from the PrestaShop 8.2.3 patch. More information: https://build.prestashop-project.org/news/2025/prestashop-8-2-3-security-release/ |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-51586 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00765 |
| scoring_system |
epss |
| scoring_elements |
0.73399 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00765 |
| scoring_system |
epss |
| scoring_elements |
0.7344 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00765 |
| scoring_system |
epss |
| scoring_elements |
0.73448 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00765 |
| scoring_system |
epss |
| scoring_elements |
0.73468 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00765 |
| scoring_system |
epss |
| scoring_elements |
0.73444 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00765 |
| scoring_system |
epss |
| scoring_elements |
0.73431 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00765 |
| scoring_system |
epss |
| scoring_elements |
0.73394 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00765 |
| scoring_system |
epss |
| scoring_elements |
0.73422 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00972 |
| scoring_system |
epss |
| scoring_elements |
0.76688 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00972 |
| scoring_system |
epss |
| scoring_elements |
0.76684 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-51586 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
| reference_url |
https://prestashop.com |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
4.2 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N |
|
| 1 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://prestashop.com |
|
| 10 |
|
| 11 |
| reference_url |
https://prestashop.com/ |
| reference_id |
prestashop.com |
| reference_type |
|
| scores |
| 0 |
| value |
3.7 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N |
|
| 1 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-08T17:47:26Z/ |
|
|
| url |
https://prestashop.com/ |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-51586, GHSA-8xx5-h6m3-jr33
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1trs-ajxn-jkhk |
|
| 1 |
| url |
VCID-5s8z-4eqn-p7h7 |
| vulnerability_id |
VCID-5s8z-4eqn-p7h7 |
| summary |
### Impact
Path disclosure in JavaScript variable
### Patches
Patch in PrestaShop 8.1.4
### References
https://owasp.org/www-community/attacks/Full_Path_Disclosure
Thanks to https://github.com/hugo-fasone |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-26129 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.003 |
| scoring_system |
epss |
| scoring_elements |
0.53291 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.003 |
| scoring_system |
epss |
| scoring_elements |
0.53394 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.003 |
| scoring_system |
epss |
| scoring_elements |
0.53389 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.003 |
| scoring_system |
epss |
| scoring_elements |
0.53352 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.003 |
| scoring_system |
epss |
| scoring_elements |
0.53368 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.003 |
| scoring_system |
epss |
| scoring_elements |
0.53384 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.003 |
| scoring_system |
epss |
| scoring_elements |
0.53333 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.003 |
| scoring_system |
epss |
| scoring_elements |
0.53286 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.003 |
| scoring_system |
epss |
| scoring_elements |
0.53317 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.003 |
| scoring_system |
epss |
| scoring_elements |
0.53339 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-26129 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-26129, GHSA-3366-9287-7qpr
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5s8z-4eqn-p7h7 |
|
| 2 |
| url |
VCID-cf1h-m5xj-mfc5 |
| vulnerability_id |
VCID-cf1h-m5xj-mfc5 |
| summary |
PrestaShop affected by time based enumeration in FO login form
### Impact
A time-based user enumeration vulnerability in the user authentication functionality of PrestaShop. This vulnerability allows an attacker to determine whether a customer account exists in the system by measuring response times.
### Patches
8.2.4 and 9.0.3
### Workarounds
none
### References
Found by Lam Yiu Tung |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-25597 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18824 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18836 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00077 |
| scoring_system |
epss |
| scoring_elements |
0.23209 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00077 |
| scoring_system |
epss |
| scoring_elements |
0.23253 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00077 |
| scoring_system |
epss |
| scoring_elements |
0.23043 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00077 |
| scoring_system |
epss |
| scoring_elements |
0.23116 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00077 |
| scoring_system |
epss |
| scoring_elements |
0.23169 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00077 |
| scoring_system |
epss |
| scoring_elements |
0.2319 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00077 |
| scoring_system |
epss |
| scoring_elements |
0.23152 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00077 |
| scoring_system |
epss |
| scoring_elements |
0.23094 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-25597 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-25597, GHSA-67v7-3g49-mxh2
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-cf1h-m5xj-mfc5 |
|
| 3 |
| url |
VCID-ws23-cmum-kyh6 |
| vulnerability_id |
VCID-ws23-cmum-kyh6 |
| summary |
PrestaShop cross-site scripting via customer contact form in FO, through file upload
### Impact
Only PrestaShops with customer-thread feature flag enabled are impacted, starting from PrestaShop 8.1.0.
The impact is substantial, when the customer thread feature flag is enabled, through the front-office contact form, a hacker can upload a malicious file containing an XSS that will be executed when an admin opens the attached file in back office.
Consequence: the script injected can access the session and the security token, which allows it to perform any authenticated action in the scope of the administrator's right.
### Patches
This vulnerability is patched in 8.1.6.
### Workarounds
As long as you have not upgraded to 8.1.6, a simple workaround is to disable the customer-thread feature-flag.
Thank you to Ayoub AIT ELMOKHTAR, who discovered this vulnerability and share it with the PrestaShop team. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-34716 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.36665 |
| scoring_system |
epss |
| scoring_elements |
0.9713 |
| published_at |
2026-04-08T12:55:00Z |
|
| 1 |
| value |
0.36665 |
| scoring_system |
epss |
| scoring_elements |
0.97147 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.36665 |
| scoring_system |
epss |
| scoring_elements |
0.97145 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.36665 |
| scoring_system |
epss |
| scoring_elements |
0.97137 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.36665 |
| scoring_system |
epss |
| scoring_elements |
0.97136 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.36665 |
| scoring_system |
epss |
| scoring_elements |
0.97135 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.36665 |
| scoring_system |
epss |
| scoring_elements |
0.97131 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.36665 |
| scoring_system |
epss |
| scoring_elements |
0.97114 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.36665 |
| scoring_system |
epss |
| scoring_elements |
0.9712 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.36665 |
| scoring_system |
epss |
| scoring_elements |
0.97121 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-34716 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-34716, GHSA-45vm-3j38-7p78
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ws23-cmum-kyh6 |
|
|
| Fixing_vulnerabilities |
| 0 |
| url |
VCID-f4m9-pgg8-nqa3 |
| vulnerability_id |
VCID-f4m9-pgg8-nqa3 |
| summary |
PrestaShop XSS can be stored in DB from "add a message form" in order detail page (FO)
### Impact
The isCleanHtml method is not used on this this form, which makes it possible to store an xss in DB.
The impact is low because the html is not interpreted in BO, thanks to twig's escape mechanism.
In FO, the xss is effective, but only impacts the customer sending it, or the customer session from which it was sent.
Be careful if you have a module fetching these messages from the DB and displaying it without escaping html.
### Patches
8.1.x
### Reporter
Reported by Rona Febriana (linkedin: https://www.linkedin.com/in/rona-febriana/) |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-21628 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00384 |
| scoring_system |
epss |
| scoring_elements |
0.59683 |
| published_at |
2026-04-09T12:55:00Z |
|
| 1 |
| value |
0.00384 |
| scoring_system |
epss |
| scoring_elements |
0.59707 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00384 |
| scoring_system |
epss |
| scoring_elements |
0.59699 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00384 |
| scoring_system |
epss |
| scoring_elements |
0.59666 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00384 |
| scoring_system |
epss |
| scoring_elements |
0.59685 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00384 |
| scoring_system |
epss |
| scoring_elements |
0.59702 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00384 |
| scoring_system |
epss |
| scoring_elements |
0.59624 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.00384 |
| scoring_system |
epss |
| scoring_elements |
0.59649 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00384 |
| scoring_system |
epss |
| scoring_elements |
0.59619 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00384 |
| scoring_system |
epss |
| scoring_elements |
0.5967 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-21628 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-21628, GHSA-vr7m-r9vm-m4wf
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-f4m9-pgg8-nqa3 |
|
| 1 |
| url |
VCID-fkcb-5u24-wqbg |
| vulnerability_id |
VCID-fkcb-5u24-wqbg |
| summary |
PrestaShop some attribute not escaped in Validate::isCleanHTML method
### Description
Some event attributes are not detected by the isCleanHTML method
### Impact
Some modules using the isCleanHTML method could be vulnerable to xss
### Patches
8.1.3, 1.7.8.11
### Workarounds
The best workaround is to use the `HTMLPurifier` library to sanitize html input coming from users. The library is already available as a dependency in the PrestaShop project. Beware though that in legacy object models, fields of `HTML` type will call `isCleanHTML`.
### Reporters
Reported by Antonio Russo (@Antonio-R1 on GitHub) and Antonio Rocco Spataro (@antoniospataro on GitHub). |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-21627 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0095 |
| scoring_system |
epss |
| scoring_elements |
0.76367 |
| published_at |
2026-04-09T12:55:00Z |
|
| 1 |
| value |
0.0095 |
| scoring_system |
epss |
| scoring_elements |
0.76413 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.0095 |
| scoring_system |
epss |
| scoring_elements |
0.76406 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.0095 |
| scoring_system |
epss |
| scoring_elements |
0.76366 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.0095 |
| scoring_system |
epss |
| scoring_elements |
0.76371 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.0095 |
| scoring_system |
epss |
| scoring_elements |
0.76393 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.0095 |
| scoring_system |
epss |
| scoring_elements |
0.76311 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.0095 |
| scoring_system |
epss |
| scoring_elements |
0.76341 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.0095 |
| scoring_system |
epss |
| scoring_elements |
0.76321 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.0095 |
| scoring_system |
epss |
| scoring_elements |
0.76354 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-21627 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-21627, GHSA-xgpm-q3mq-46rq
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-fkcb-5u24-wqbg |
|
|
| Risk_score | 4.5 |
| Resource_url | http://public2.vulnerablecode.io/packages/pkg:composer/prestashop/prestashop@8.1.3 |