Prestashop releases patch for critical SQL vulnerability that lets any back-office user delete the database

Prestashop releases patch for critical SQL vulnerability that lets any back-office user delete the database

Prestashop, a popular open-source e-commerce web application, has released a new version that addresses a critical-severity vulnerability. This vulnerability, tracked as CVE-2023-30839, allows any back-office user to write, update, or delete SQL databases regardless of their permissions.

The critical vulnerability, which has a CVSS v3.1 score of 9.9, can allow any user to perform unauthorized modifications on the online store’s database. This can potentially cause significant damage or service outage to impacted businesses.

According to Prestashop, versions prior to 8.0.4 and 1.7.8.9 contain a SQL filtering vulnerability. This means that a user can write, update, and delete in the database, even without having specific rights. However, Prestashop 8.0.4 and 1.7.8.9 contain a patch for this issue.

As of now, there are no known workarounds for this vulnerability. This means that businesses using Prestashop are advised to update their systems to the latest version as soon as possible to avoid any potential damage or service outage.

This vulnerability is a critical reminder of the importance of regularly updating software and applications to their latest versions. It also highlights the need for businesses to have robust security measures in place to protect their online systems and data.

by Paul

  • ...

PrestaShop is an online store builder with 132 alternatives on AlternativeTo, including Thirty Bees, Shopping Cart Elite, and Drupal. It's categorized as an online store builder and has an average rating of 2.2. Some of the top features on AlternativeTo for PrestaShop include a shopping cart, dropshipping tool, and support for multiple currencies.

No comments so far, maybe you want to be first?
Gu