Information Exposure Affecting prestashop/prestashop package, versions <8.2.3


Severity

Recommended
0.0
low
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.03% (6th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-PHP-PRESTASHOPPRESTASHOP-12515409
  • published5 Sept 2025
  • disclosed4 Sept 2025
  • creditMaxime Morel-Bailly

Introduced: 4 Sep 2025

NewCVE-2025-51586  (opens in a new tab)
CWE-203  (opens in a new tab)

How to fix?

Upgrade prestashop/prestashop to version 8.2.3 or higher.

Overview

prestashop/prestashop is an Open Source e-commerce platform, committed to providing the best shopping cart experience for both merchants and customers.

Affected versions of this package are vulnerable to Information Exposure via manipulation of the id_employee and reset_token parameters on the password reset page. An attacker with an access to the back-office URL can obtain employee email addresses by sending valid requests and observing response discrepancies, potentially enabling targeted phishing, social engineering, or brute-force attacks.

Workaround

Steps to reduce the risks:

  1. Restrict network access to the back office (VPN, IP allow‑list, reverse proxy).
  2. Add an extra HTTP authentication layer in front of the back office.
  3. Customize/obfuscate the back office URL.
  4. Add rate limiting or WAF rules for the password reset route and repeated requests with varying id_employee.
  5. Monitor logs for bursts of reset_token / id_employee parameter combinations. Enable 2FA for employee accounts (through a third-party module) to limit follow‑on impact.

CVSS Base Scores

version 4.0
version 3.1