Impact
PrestaShop versions older than 8.2.5 and 9.1.0 contain a flaw in the way the validation framework is used. The improper handling of input could allow malicious data to bypass normal checks, potentially leading to data integrity problems or accidental exposure of information. The CVSS score of 2 indicates that the overall impact is considered low and no confirmed exploitation cases are reported.
Affected Systems
The affected product is PrestaShop, the open‑source e‑commerce platform. All releases prior to 8.2.5 in the 8.x series and prior to 9.1.0 in the 9.x series are vulnerable. The vendor has released 8.2.5 and 9.1.0 with the required fix, so any installation running an older version of either major release is potentially impacted.
Risk and Exploitability
With a CVSS score of 2 the risk is rated low. EPSS data is not available and the flaw is not listed in the CISA KEV catalog, suggesting that it is not a high‑visibility target. Based on the description, the likely attack vector is remote, involving specially crafted requests sent to the web application. No known workarounds exist, and exploiting the flaw would require input that can reach the validation stage of the processing pipeline.
OpenCVE Enrichment
Github GHSA