CVE-2025-24027

6.2 MEDIUM

📋 TL;DR

This is a stored cross-site scripting (XSS) vulnerability in the ps_contactinfo PrestaShop module that allows attackers to inject malicious scripts into formatted address displays. Only shops made vulnerable by third-party modules with SQL injection vulnerabilities are affected, not fresh PrestaShop installations. Attackers could steal session cookies, redirect users, or perform actions on behalf of authenticated users.

💻 Affected Systems

Products:
  • PrestaShop ps_contactinfo module
Versions: Up to and including version 3.3.2
Operating Systems: All operating systems running PrestaShop
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when combined with third-party modules that have SQL injection vulnerabilities. Fresh PrestaShop installations are not affected.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator session cookies, take over the PrestaShop admin panel, deface the store, steal customer data, or install backdoors for persistent access.

🟠

Likely Case

Attackers inject malicious JavaScript that steals user session cookies or redirects customers to phishing sites when they view contact information pages.

🟢

If Mitigated

With proper input validation and output encoding, the malicious scripts would be rendered harmless as plain text rather than executable code.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires a separate SQL injection vulnerability in another module to store the XSS payload in the database first.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.3.3

Vendor Advisory: https://github.com/PrestaShop/ps_contactinfo/security/advisories/GHSA-35pq-7pv2-2rfw

Restart Required: No

Instructions:

1. Update the ps_contactinfo module to version 3.3.3 or later via PrestaShop admin panel or manual installation. 2. Verify the fix by checking module version. 3. Ensure all third-party modules are updated to prevent SQL injection vulnerabilities that could enable this XSS.

🧯 If You Can't Patch

  • Disable the ps_contactinfo module if not essential for store operations.
  • Implement strict Content Security Policy (CSP) headers to prevent script execution from untrusted sources.

🔍 How to Verify

Check if Vulnerable:

Check ps_contactinfo module version in PrestaShop admin panel under Modules > Module Manager. If version is 3.3.2 or lower, the module is vulnerable.

Check Version:

Not applicable - check via PrestaShop admin interface

Verify Fix Applied:

After updating, verify module version shows 3.3.3 or higher in PrestaShop admin panel. Test contact information pages for any unexpected script execution.

📡 Detection & Monitoring

Log Indicators:

  • Unusual database queries to contact information tables
  • JavaScript payloads in contact form submissions or database entries
  • Unexpected script tags in rendered contact pages

Network Indicators:

  • External JavaScript loading from contact information pages
  • Suspicious redirects from contact pages

SIEM Query:

web_logs WHERE (url_path CONTAINS '/contact' OR url_path CONTAINS '/module/ps_contactinfo') AND (request_body CONTAINS '<script>' OR request_body CONTAINS 'javascript:' OR response_body CONTAINS 'malicious-domain.com')

🔗 References

📤 Share & Export