CVE-2025-61922

9.1 CRITICAL

📋 TL;DR

A critical authentication bypass vulnerability in PrestaShop Checkout payment module allows attackers to silently log in as any user via email manipulation during Express Checkout. This enables complete account takeover of customer accounts. All PrestaShop installations using affected versions of the Checkout module are vulnerable.

💻 Affected Systems

Products:
  • PrestaShop Checkout (official PayPal payment module)
Versions: 1.3.0 to 4.4.0, and 5.0.0 to 5.0.4
Operating Systems: All operating systems running PrestaShop
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects installations with the PrestaShop Checkout module enabled and using Express Checkout feature.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of all customer accounts, unauthorized purchases, data theft, and administrative account takeover if admin emails are known.

🟠

Likely Case

Attackers take over customer accounts to make fraudulent purchases, steal personal information, and abuse stored payment methods.

🟢

If Mitigated

With proper monitoring, unauthorized logins can be detected and blocked, but the vulnerability still exists until patched.

🌐 Internet-Facing: HIGH - The vulnerability affects internet-facing e-commerce sites and requires no authentication to exploit.
🏢 Internal Only: LOW - This primarily affects customer-facing payment functionality, not internal systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires no authentication and involves manipulating email parameters during Express Checkout flow.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.4.1 or 5.0.5

Vendor Advisory: https://github.com/PrestaShopCorp/ps_checkout/security/advisories/GHSA-54hq-mf6h-48xh

Restart Required: No

Instructions:

1. Log into PrestaShop admin panel. 2. Navigate to Modules > Module Manager. 3. Find 'PrestaShop Checkout' module. 4. Click 'Upgrade' to version 4.4.1 (for PrestaShop 1.7) or 5.0.5 (for PrestaShop 8). 5. Clear PrestaShop cache after upgrade.

🔧 Temporary Workarounds

Disable Express Checkout

all

Temporarily disable the vulnerable Express Checkout feature while waiting to patch

🧯 If You Can't Patch

  • Implement strict rate limiting on login attempts and Express Checkout requests
  • Enable detailed logging of all authentication events and monitor for suspicious patterns

🔍 How to Verify

Check if Vulnerable:

Check PrestaShop Checkout module version in admin panel under Modules > Module Manager > PrestaShop Checkout

Check Version:

No direct CLI command; check via PrestaShop admin interface or database query: SELECT version FROM ps_module WHERE name = 'ps_checkout'

Verify Fix Applied:

Confirm module version shows 4.4.1 or higher (for PrestaShop 1.7) or 5.0.5 or higher (for PrestaShop 8)

📡 Detection & Monitoring

Log Indicators:

  • Multiple login attempts from same IP with different email addresses
  • Express Checkout requests with unusual email patterns
  • Successful logins without password verification

Network Indicators:

  • Unusual Express Checkout API call patterns
  • Multiple authentication requests in short timeframes

SIEM Query:

source="prestashop" AND (event="express_checkout" OR event="login") | stats count by email, ip_address | where count > threshold

🔗 References

📤 Share & Export