Description
An issue in prestashop upsshipping all versions through at least 2.4.0 allows a remote attacker to obtain sensitive information via the /modules/upsshipping/logs/, and /modules/upsshipping/lib/UPSBaseApi.php components
Published: 2026-05-18
Score: 7.5 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

An issue in the Prestashop UPS Shipping module enables a remote attacker to read sensitive information from the "/modules/upsshipping/logs/" and "/modules/upsshipping/lib/UPSBaseApi.php" components. The affected components store shipping details and possibly customer data. An attacker who can fetch the logs or API source code can acquire confidential data such as order contents, shipping addresses, and UPS credentials. The vulnerability is a form of information exposure; it does not permit arbitrary code execution but can lead to privacy violations, financial loss, and regulatory non‑compliance.

Affected Systems

Affected systems The vulnerability affects Prestashop e‑commerce installations that include the UPS Shipping module, at least up to version 2.4.0. Any deployment of Prestashop with this module, regardless of custom modifications, is at risk if the application server exposes the modules directory to the public.

Risk and Exploitability

Risk and exploitability The CVSS score is 7.5, the EPSS score is not available, and the vulnerability is not listed as a Known Exploited Vulnerability. Nevertheless, the attack vector is remote and likely unauthenticated, requiring only a web request to the exposed URLs. Because the module logs are typically accessible to anyone who can reach the web server, the exploitation likelihood is high for exposed installations. The lack of patch or workaround information suggests that the only mitigation is to apply vendor fixes as soon as they become available; until then, exposure remains.

Generated by OpenCVE AI on May 18, 2026 at 16:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Prestashop release or module patch when available to remove the vulnerability.
  • Restrict access to the "/modules/upsshipping/" directory with web server configuration or .htaccess rules, limiting the scope to trusted administrators only.
  • Ensure that logs and source files containing UPS credentials are removed from any public web‑accessible paths or protected by authentication.

Generated by OpenCVE AI on May 18, 2026 at 16:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 18 May 2026 16:15:00 +0000

Type Values Removed Values Added
Title Prestashop UPS Shipping Module Enables Remote Information Disclosure via Logs and API Source

Mon, 18 May 2026 15:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-200
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 18 May 2026 14:30:00 +0000

Type Values Removed Values Added
Description An issue in prestashop upsshipping all versions through at least 2.4.0 allows a remote attacker to obtain sensitive information via the /modules/upsshipping/logs/, and /modules/upsshipping/lib/UPSBaseApi.php components
References

Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-05-18T14:59:31.620Z

Reserved: 2026-04-06T00:00:00.000Z

Link: CVE-2026-39079

cve-icon Vulnrichment

Updated: 2026-05-18T14:59:27.985Z

cve-icon NVD

Status : Deferred

Published: 2026-05-18T15:16:25.533

Modified: 2026-05-18T20:17:10.873

Link: CVE-2026-39079

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-18T17:00:13Z

Weaknesses