CVE-2025-1230

4.8 MEDIUM

📋 TL;DR

A stored Cross-Site Scripting (XSS) vulnerability in PrestaShop 8.1.7 allows attackers to inject malicious scripts through the 'link' parameter in the admin interface. This could enable session hijacking by stealing authenticated users' cookies. Only PrestaShop 8.1.7 installations with admin access are affected.

💻 Affected Systems

Products:
  • PrestaShop
Versions: 8.1.7
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects installations with the default admin directory path. Custom admin directory names may reduce exposure.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Administrator account compromise leading to full control of the e-commerce platform, data theft, and potential malware distribution to customers.

🟠

Likely Case

Session hijacking of admin users, allowing unauthorized access to the admin panel and potential data exfiltration.

🟢

If Mitigated

Limited impact with proper input validation and output encoding in place, though some risk remains.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires the attacker to have access to submit malicious input through the vulnerable parameter, typically requiring some level of access to the admin interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 8.1.8 or later

Vendor Advisory: https://www.prestashop.com/security-advisories

Restart Required: No

Instructions:

1. Backup your PrestaShop installation and database. 2. Download the latest PrestaShop version from the official website. 3. Replace the affected files with the patched versions. 4. Clear the cache and test functionality.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement server-side validation to sanitize the 'link' parameter input.

Modify /<admin_directory>/index.php to include input sanitization for the 'link' parameter

Content Security Policy (CSP)

all

Implement CSP headers to mitigate XSS impact by restricting script execution.

Add 'Content-Security-Policy' header to your web server configuration

🧯 If You Can't Patch

  • Restrict access to the admin interface using IP whitelisting or VPN.
  • Implement web application firewall (WAF) rules to block XSS payloads in the 'link' parameter.

🔍 How to Verify

Check if Vulnerable:

Check if your PrestaShop version is 8.1.7 by reviewing the configuration file or admin panel.

Check Version:

Check the /app/config/parameters.php file for the 'version' parameter or view in admin panel under Advanced Parameters > Information.

Verify Fix Applied:

Verify the installation is running PrestaShop 8.1.8 or later and test the 'link' parameter with XSS payloads.

📡 Detection & Monitoring

Log Indicators:

  • Unusual 'link' parameter values in admin access logs containing script tags or JavaScript code

Network Indicators:

  • HTTP requests to admin interface with suspicious 'link' parameter values

SIEM Query:

source="web_access_logs" AND uri="/admin/index.php" AND query="*link=*<script>*"

🔗 References

📤 Share & Export