{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/10682?format=json","vulnerability_id":"VCID-g8wq-cvqc-9kfr","summary":"Cross-site Scripting\nIn PrestaShop, the `shop_country` parameter in the `install/index.Exploitation by a malicious actor requires the user to follow the initial stages of the setup (accepting terms and conditions) before executing the malicious link.","aliases":[{"alias":"CVE-2019-11876"},{"alias":"GHSA-6grv-hw8g-4gfm"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/36444?format=json","purl":"pkg:composer/drupal/core@8.7.1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-16ns-uqh5-d3gh"},{"vulnerability":"VCID-5618-53yg-8qh4"},{"vulnerability":"VCID-5kh7-v1uc-wfha"},{"vulnerability":"VCID-6ck5-9e5b-w3ay"},{"vulnerability":"VCID-6m8x-cfzp-tkf4"},{"vulnerability":"VCID-77zc-1gc8-r7b7"},{"vulnerability":"VCID-7fs3-gwc7-nkes"},{"vulnerability":"VCID-9ss3-mvt3-8bem"},{"vulnerability":"VCID-bbzr-hbhv-yyee"},{"vulnerability":"VCID-bkxp-gn34-67av"},{"vulnerability":"VCID-cvxp-ctj9-guej"},{"vulnerability":"VCID-dgjq-y5zj-cud1"},{"vulnerability":"VCID-ed6y-c9tz-mbds"},{"vulnerability":"VCID-fwbj-ctxz-2bc6"},{"vulnerability":"VCID-g33x-1paw-7udm"},{"vulnerability":"VCID-hgb1-xrne-e7c8"},{"vulnerability":"VCID-hwnd-nuv7-jqbh"},{"vulnerability":"VCID-j21d-w3g7-cbcg"},{"vulnerability":"VCID-jctf-yffu-hbag"},{"vulnerability":"VCID-jrb8-jnz4-83c8"},{"vulnerability":"VCID-k1gx-nznx-7qd6"},{"vulnerability":"VCID-kam1-84p4-qych"},{"vulnerability":"VCID-mapb-hsvc-2khc"},{"vulnerability":"VCID-n119-gta2-kfg1"},{"vulnerability":"VCID-n7un-zgqv-jfef"},{"vulnerability":"VCID-nj3a-eb59-jygs"},{"vulnerability":"VCID-qvbt-7e55-4bg4"},{"vulnerability":"VCID-st6v-ch5g-r7h2"},{"vulnerability":"VCID-syrg-ckq7-cbd6"},{"vulnerability":"VCID-u4w3-usvb-jyf6"},{"vulnerability":"VCID-ummk-h11z-bkaj"},{"vulnerability":"VCID-uqcw-p8g2-cfd2"},{"vulnerability":"VCID-v9v6-ae3e-g3hk"},{"vulnerability":"VCID-vevm-4sfk-f7gq"},{"vulnerability":"VCID-vrdx-165p-efda"},{"vulnerability":"VCID-w6cz-mg4v-3udj"},{"vulnerability":"VCID-wbuz-qcp3-43aq"},{"vulnerability":"VCID-ww44-hb2y-mfd5"},{"vulnerability":"VCID-wzgs-fr3u-cbdn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:composer/drupal/core@8.7.1"},{"url":"http://public2.vulnerablecode.io/api/packages/272552?format=json","purl":"pkg:composer/prestashop/prestashop@1.7.6.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1trs-ajxn-jkhk"},{"vulnerability":"VCID-22v3-9qr1-pyfg"},{"vulnerability":"VCID-2kkx-8ucb-7ucj"},{"vulnerability":"VCID-45hk-m7uv-zqfe"},{"vulnerability":"VCID-7wj5-37ma-hbhg"},{"vulnerability":"VCID-8beq-8rca-mbhd"},{"vulnerability":"VCID-9n6p-8b89-63c6"},{"vulnerability":"VCID-bmyy-gqbc-ybhz"},{"vulnerability":"VCID-c4g5-t8vx-syax"},{"vulnerability":"VCID-cf1h-m5xj-mfc5"},{"vulnerability":"VCID-ey36-u4qn-gbge"},{"vulnerability":"VCID-f4m9-pgg8-nqa3"},{"vulnerability":"VCID-f7s4-16b7-zkcm"},{"vulnerability":"VCID-fkcb-5u24-wqbg"},{"vulnerability":"VCID-gggb-dges-qke1"},{"vulnerability":"VCID-ghu1-c6e6-pudm"},{"vulnerability":"VCID-htkt-tj6d-hydx"},{"vulnerability":"VCID-keyj-v83x-nkck"},{"vulnerability":"VCID-kwe1-5ukw-cbau"},{"vulnerability":"VCID-mb3x-p2d7-gqdx"},{"vulnerability":"VCID-qx7c-y2p8-vye9"},{"vulnerability":"VCID-s53g-k7gw-yyd4"},{"vulnerability":"VCID-vcuy-9cdj-uyhz"},{"vulnerability":"VCID-vsng-njkm-hydv"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:composer/prestashop/prestashop@1.7.6.0"}],"affected_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/36442?format=json","purl":"pkg:composer/drupal/core@8.7.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-16ns-uqh5-d3gh"},{"vulnerability":"VCID-349d-w26k-mqfw"},{"vulnerability":"VCID-5618-53yg-8qh4"},{"vulnerability":"VCID-5kh7-v1uc-wfha"},{"vulnerability":"VCID-6ck5-9e5b-w3ay"},{"vulnerability":"VCID-6m8x-cfzp-tkf4"},{"vulnerability":"VCID-77zc-1gc8-r7b7"},{"vulnerability":"VCID-7fs3-gwc7-nkes"},{"vulnerability":"VCID-9ss3-mvt3-8bem"},{"vulnerability":"VCID-bbzr-hbhv-yyee"},{"vulnerability":"VCID-bkxp-gn34-67av"},{"vulnerability":"VCID-cvxp-ctj9-guej"},{"vulnerability":"VCID-dgjq-y5zj-cud1"},{"vulnerability":"VCID-ed6y-c9tz-mbds"},{"vulnerability":"VCID-fwbj-ctxz-2bc6"},{"vulnerability":"VCID-g33x-1paw-7udm"},{"vulnerability":"VCID-g8wq-cvqc-9kfr"},{"vulnerability":"VCID-hgb1-xrne-e7c8"},{"vulnerability":"VCID-hwnd-nuv7-jqbh"},{"vulnerability":"VCID-j21d-w3g7-cbcg"},{"vulnerability":"VCID-jctf-yffu-hbag"},{"vulnerability":"VCID-jrb8-jnz4-83c8"},{"vulnerability":"VCID-k1gx-nznx-7qd6"},{"vulnerability":"VCID-kam1-84p4-qych"},{"vulnerability":"VCID-mapb-hsvc-2khc"},{"vulnerability":"VCID-n119-gta2-kfg1"},{"vulnerability":"VCID-n7un-zgqv-jfef"},{"vulnerability":"VCID-nj3a-eb59-jygs"},{"vulnerability":"VCID-qvbt-7e55-4bg4"},{"vulnerability":"VCID-st6v-ch5g-r7h2"},{"vulnerability":"VCID-syrg-ckq7-cbd6"},{"vulnerability":"VCID-u4w3-usvb-jyf6"},{"vulnerability":"VCID-ummk-h11z-bkaj"},{"vulnerability":"VCID-uqcw-p8g2-cfd2"},{"vulnerability":"VCID-v9v6-ae3e-g3hk"},{"vulnerability":"VCID-vevm-4sfk-f7gq"},{"vulnerability":"VCID-vrdx-165p-efda"},{"vulnerability":"VCID-w6cz-mg4v-3udj"},{"vulnerability":"VCID-wbuz-qcp3-43aq"},{"vulnerability":"VCID-ww44-hb2y-mfd5"},{"vulnerability":"VCID-wzgs-fr3u-cbdn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:composer/drupal/core@8.7.0"},{"url":"http://public2.vulnerablecode.io/api/packages/82020?format=json","purl":"pkg:composer/prestashop/prestashop@1.7.5%2B2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-g8wq-cvqc-9kfr"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:composer/prestashop/prestashop@1.7.5%252B2"},{"url":"http://public2.vulnerablecode.io/api/packages/272551?format=json","purl":"pkg:composer/prestashop/prestashop@1.7.5.2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1trs-ajxn-jkhk"},{"vulnerability":"VCID-22v3-9qr1-pyfg"},{"vulnerability":"VCID-2kkx-8ucb-7ucj"},{"vulnerability":"VCID-45hk-m7uv-zqfe"},{"vulnerability":"VCID-7wj5-37ma-hbhg"},{"vulnerability":"VCID-8beq-8rca-mbhd"},{"vulnerability":"VCID-9n6p-8b89-63c6"},{"vulnerability":"VCID-bmyy-gqbc-ybhz"},{"vulnerability":"VCID-c4g5-t8vx-syax"},{"vulnerability":"VCID-cf1h-m5xj-mfc5"},{"vulnerability":"VCID-ey36-u4qn-gbge"},{"vulnerability":"VCID-f4m9-pgg8-nqa3"},{"vulnerability":"VCID-f7s4-16b7-zkcm"},{"vulnerability":"VCID-fkcb-5u24-wqbg"},{"vulnerability":"VCID-g8wq-cvqc-9kfr"},{"vulnerability":"VCID-gggb-dges-qke1"},{"vulnerability":"VCID-ghu1-c6e6-pudm"},{"vulnerability":"VCID-htkt-tj6d-hydx"},{"vulnerability":"VCID-keyj-v83x-nkck"},{"vulnerability":"VCID-kwe1-5ukw-cbau"},{"vulnerability":"VCID-mb3x-p2d7-gqdx"},{"vulnerability":"VCID-qx7c-y2p8-vye9"},{"vulnerability":"VCID-s53g-k7gw-yyd4"},{"vulnerability":"VCID-vcuy-9cdj-uyhz"},{"vulnerability":"VCID-vsng-njkm-hydv"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:composer/prestashop/prestashop@1.7.5.2"}],"references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-11876","reference_id":"","reference_type":"","scores":[{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43531","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43673","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.4361","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43614","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43532","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43404","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43479","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43498","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43434","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43466","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43647","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43704","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43729","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43663","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43713","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43717","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43736","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43705","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43688","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.4375","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43741","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-11876"},{"reference_url":"https://github.com/PrestaShop/PrestaShop","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/PrestaShop/PrestaShop"},{"reference_url":"https://www.logicallysecure.com/blog/xss-presta-xss-drupal","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.logicallysecure.com/blog/xss-presta-xss-drupal"},{"reference_url":"https://www.logicallysecure.com/blog/xss-presta-xss-drupal/","reference_id":"","reference_type":"","scores":[],"url":"https://www.logicallysecure.com/blog/xss-presta-xss-drupal/"},{"reference_url":"https://www.prestashop.com/forums/forum/2-prestashop-news-and-releases","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.prestashop.com/forums/forum/2-prestashop-news-and-releases"},{"reference_url":"https://www.prestashop.com/forums/forum/2-prestashop-news-and-releases/","reference_id":"","reference_type":"","scores":[],"url":"https://www.prestashop.com/forums/forum/2-prestashop-news-and-releases/"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-11876","reference_id":"CVE-2019-11876","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-11876"},{"reference_url":"https://github.com/advisories/GHSA-6grv-hw8g-4gfm","reference_id":"GHSA-6grv-hw8g-4gfm","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-6grv-hw8g-4gfm"}],"weaknesses":[{"cwe_id":1035,"name":"OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities","description":"Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017."},{"cwe_id":79,"name":"Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')","description":"The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users."},{"cwe_id":937,"name":"OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities","description":"Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013."}],"exploits":[],"severity_range_score":"4.0 - 6.9","exploitability":"0.5","weighted_severity":"6.2","risk_score":3.1,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-g8wq-cvqc-9kfr"}