CVE-2023-27846

9.8 CRITICAL

📋 TL;DR

This SQL injection vulnerability in PrestaShop themevolty modules allows remote attackers to execute arbitrary SQL commands through multiple components. Attackers can gain administrative privileges, access sensitive data, or compromise the entire PrestaShop installation. All PrestaShop installations using themevolty modules v4.0.8 or earlier are affected.

💻 Affected Systems

Products:
  • PrestaShop themevolty modules
Versions: v4.0.8 and earlier
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects multiple themevolty components: tvcmsblog, tvcmsvideotab, tvcmswishlist, tvcmsbrandlist, tvcmscategorychainslider, tvcmscategoryproduct, tvcmscategoryslider, tvcmspaymenticon, tvcmstestimonial

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the PrestaShop installation including database takeover, customer data theft, and server compromise leading to ransomware deployment or credential harvesting.

🟠

Likely Case

Administrative privilege escalation allowing attackers to modify store content, steal customer data, install backdoors, or deploy skimmers for payment card theft.

🟢

If Mitigated

Limited impact if proper input validation and WAF rules are in place, though SQL injection attempts may still be logged.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection vulnerabilities are well-understood with many automated tools available. The multiple affected components increase attack surface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v4.0.9 or later

Vendor Advisory: https://security.friendsofpresta.org/modules/2023/10/25/tvcmsblog.html

Restart Required: No

Instructions:

1. Update all themevolty modules to v4.0.9 or later via PrestaShop admin panel or manual upload. 2. Clear PrestaShop cache. 3. Verify modules are functioning correctly.

🔧 Temporary Workarounds

Disable affected modules

all

Temporarily disable vulnerable themevolty modules until patching is possible

Navigate to PrestaShop admin > Modules > Module Manager > Disable affected themevolty modules

WAF rule implementation

all

Implement web application firewall rules to block SQL injection patterns

ModSecurity rule: SecRule ARGS "@detectSQLi" "id:1001,phase:2,deny,status:403,msg:'SQL Injection Attempt'"
Cloudflare WAF: Enable SQLi protection

🧯 If You Can't Patch

  • Implement strict input validation and parameterized queries at application level
  • Deploy network segmentation and restrict database access to only necessary IP addresses

🔍 How to Verify

Check if Vulnerable:

Check module versions in PrestaShop admin panel under Modules > Module Manager for any themevolty modules with version 4.0.8 or earlier

Check Version:

SELECT name, version FROM ps_module WHERE name LIKE 'tvcms%';

Verify Fix Applied:

Confirm all themevolty modules show version 4.0.9 or later in module manager

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple failed login attempts from single IP
  • Unexpected admin user creation in PrestaShop logs

Network Indicators:

  • HTTP requests with SQL keywords (UNION, SELECT, INSERT) to themevolty module endpoints
  • Unusual outbound database connections

SIEM Query:

source="prestashop.log" AND ("tvcmsblog" OR "tvcmsvideotab" OR "tvcmswishlist") AND ("UNION" OR "SELECT" OR "INSERT" OR "--" OR "' OR '1'='1")

🔗 References

📤 Share & Export