CVE-2026-44212

PrestaShop · PrestaShop

A stored Cross-Site Scripting (XSS) vulnerability in PrestaShop allows unauthenticated attackers to trigger a back-office takeover via the Contact Us form.

Executive summary

A critical stored XSS vulnerability in the PrestaShop back-office allows unauthenticated attackers to hijack administrative sessions and gain full control over the application.

Vulnerability

The vulnerability exists in the Customer Service view of the back-office. An unauthenticated attacker can submit a malicious payload via the public Contact Us form, which is then stored and executed when an administrator views the ticket.

Business impact

This flaw facilitates a full back-office takeover, granting the attacker total control over the e-commerce environment. Given the CVSS score of 9.3, this represents a severe threat to the integrity of the store, allowing for unauthorized modifications to product listings, customer data theft, and potential malware distribution.

Remediation

Immediate Action: Apply the security update to PrestaShop version 8.2.6 or 9.1.1 immediately.

Proactive Monitoring: Audit back-office customer service threads for suspicious email addresses or script tags.

Compensating Controls: Utilize a WAF to inspect incoming form submissions for malicious JavaScript payloads.

Exploitation status

Public Exploit Available: Unknown

Analyst recommendation

Administrative takeover vulnerabilities are high-priority targets. It is essential to update the PrestaShop environment to the latest patched version to prevent unauthorized access and maintain the security of your e-commerce operations.