{"api_version":"1","generated_at":"2026-04-22T17:48:19+00:00","cve":"CVE-2023-39526","urls":{"html":"https://cve.report/CVE-2023-39526","api":"https://cve.report/api/cve/CVE-2023-39526.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-39526","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-39526"},"summary":{"title":"CVE-2023-39526","description":"PrestaShop is an open source e-commerce web application. Versions prior to 1.7.8.10, 8.0.5, and 8.1.1 are vulnerable to remote code execution through SQL injection and arbitrary file write in the back office. Versions 1.7.8.10, 8.0.5, and 8.1.1 contain a patch. There are no known workarounds.","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2023-08-07 21:15:00","updated_at":"2023-08-09 20:18:00"},"problem_types":["CWE-89"],"metrics":[],"references":[{"url":"https://github.com/PrestaShop/PrestaShop/commit/817847e2347844a9b6add017581f1932bcd28c09","name":"https://github.com/PrestaShop/PrestaShop/commit/817847e2347844a9b6add017581f1932bcd28c09","refsource":"MISC","tags":[],"title":"Merge remote-tracking branch 'ghsa-gf46-prm4-56pc/fix-advisory-1' int… · PrestaShop/PrestaShop@817847e · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-gf46-prm4-56pc","name":"https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-gf46-prm4-56pc","refsource":"MISC","tags":[],"title":"SQL manager vulnerability (potential RCE) · Advisory · PrestaShop/PrestaShop · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-39526","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-39526","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"39526","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"prestashop","cpe5":"prestashop","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"39526","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"prestashop","cpe5":"prestashop","cpe6":"8.1.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2023-39526","qid":"994773","title":"PHP (Composer) Security Update for prestashop/prestashop (GHSA-gf46-prm4-56pc)"}]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-39526","ASSIGNER":"security-advisories@github.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"PrestaShop is an open source e-commerce web application. Versions prior to 1.7.8.10, 8.0.5, and 8.1.1 are vulnerable to remote code execution through SQL injection and arbitrary file write in the back office. Versions 1.7.8.10, 8.0.5, and 8.1.1 contain a patch. There are no known workarounds."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')","cweId":"CWE-89"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"PrestaShop","product":{"product_data":[{"product_name":"PrestaShop","version":{"version_data":[{"version_affected":"=","version_value":"< 1.7.8.10"},{"version_affected":"=","version_value":">= 8.0.0, < 8.0.5"},{"version_affected":"=","version_value":"= 8.1.0"}]}}]}}]}},"references":{"reference_data":[{"url":"https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-gf46-prm4-56pc","refsource":"MISC","name":"https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-gf46-prm4-56pc"},{"url":"https://github.com/PrestaShop/PrestaShop/commit/817847e2347844a9b6add017581f1932bcd28c09","refsource":"MISC","name":"https://github.com/PrestaShop/PrestaShop/commit/817847e2347844a9b6add017581f1932bcd28c09"}]},"source":{"advisory":"GHSA-gf46-prm4-56pc","discovery":"UNKNOWN"},"impact":{"cvss":[{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":9.1,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"HIGH","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H","version":"3.1"}]}},"nvd":{"publishedDate":"2023-08-07 21:15:00","lastModifiedDate":"2023-08-09 20:18:00","problem_types":["CWE-89"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"},"exploitabilityScore":3.9,"impactScore":5.9}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:prestashop:prestashop:8.1.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:prestashop:prestashop:*:*:*:*:*:*:*:*","versionEndExcluding":"1.7.8.10","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:prestashop:prestashop:*:*:*:*:*:*:*:*","versionStartIncluding":"8.0.0","versionEndExcluding":"8.0.5","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}