PrestaShop vulnerable to SQL filter bypass leading to arbitrary write requests using "SQL Manager"
CVE-2023-30839
Key Information:
- Vendor
Prestashop
- Status
- Vendor
- CVE Published:
- 25 April 2023
Badges
What is CVE-2023-30839?
PrestaShop, an open-source e-commerce platform, is affected by a SQL filtering vulnerability in versions prior to 8.0.4 and 1.7.8.9. This flaw allows authorized Backend Office (BO) users to execute database operations such as writing, updating, and deleting data, even if they lack specific rights. This vulnerability can lead to unintended data manipulation and compromise the integrity of the database. PrestaShop versions 8.0.4 and 1.7.8.9 include a patch to mitigate this issue, and no workarounds are available.
Affected Version(s)
PrestaShop >= 8.0.0, < 8.0.4 < 8.0.0, 8.0.4
PrestaShop < 1.7.8.9 < 1.7.8.9
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved