CVE-2025-25692

6.5 MEDIUM

📋 TL;DR

A PHAR deserialization vulnerability in PrestaShop v8.2.0 allows attackers to execute arbitrary code on the server by sending a specially crafted POST request. This affects all websites running PrestaShop v8.2.0 with the vulnerable function exposed. Attackers can potentially gain full control of the affected e-commerce system.

💻 Affected Systems

Products:
  • PrestaShop
Versions: v8.2.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects PrestaShop v8.2.0; earlier and later versions may be unaffected

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise leading to data theft, malware deployment, and persistent backdoor installation

🟠

Likely Case

Remote code execution allowing website defacement, data exfiltration, and credential harvesting

🟢

If Mitigated

Limited impact with proper WAF rules and input validation blocking malicious requests

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending a crafted POST request to the vulnerable endpoint; no authentication needed

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v8.2.1 or later

Vendor Advisory: http://prestashop.com

Restart Required: No

Instructions:

1. Backup your PrestaShop installation and database. 2. Download the latest version from PrestaShop's official website. 3. Replace the vulnerable files with patched versions. 4. Clear cache and verify functionality.

🔧 Temporary Workarounds

Disable PHAR deserialization

all

Modify PHP configuration to disable PHAR deserialization

php -d phar.readonly=1

Input validation filter

all

Add input validation to block malicious POST requests

Add validation in _getHeaders function to sanitize input

🧯 If You Can't Patch

  • Implement Web Application Firewall (WAF) rules to block suspicious POST requests containing PHAR indicators
  • Restrict access to the vulnerable endpoint using IP whitelisting or authentication requirements

🔍 How to Verify

Check if Vulnerable:

Check if PrestaShop version is exactly 8.2.0 by examining the configuration file or admin panel

Check Version:

grep -r '_PS_VERSION_' config/settings.inc.php

Verify Fix Applied:

Verify version is updated to 8.2.1 or later and test with known exploit payloads

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to _getHeaders function
  • PHP errors related to deserialization
  • Unexpected file operations

Network Indicators:

  • POST requests with PHAR:// strings
  • Unusual outbound connections from web server

SIEM Query:

source="web_logs" AND (POST AND "_getHeaders" AND "PHAR")

🔗 References

📤 Share & Export