CVE-2022-35933: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in PrestaShop productcomments
This package is a PrestaShop module that allows users to post reviews and rate products. There is a vulnerability where the attacker could steal an administrator's cookie. The issue is fixed in version 5.0.2.
AI Analysis
Technical Summary
CVE-2022-35933 is a cross-site scripting (XSS) vulnerability identified in the PrestaShop 'productcomments' module, which is used to allow users to post reviews and rate products on e-commerce websites running the PrestaShop platform. The vulnerability arises due to improper neutralization of input during web page generation (CWE-79), specifically allowing malicious input to be injected and executed in the context of an administrator's browser session. An attacker exploiting this vulnerability can craft a specially designed input (such as a product review containing malicious JavaScript) that, when viewed by an administrator, executes in their browser and can steal sensitive information such as authentication cookies. This can lead to session hijacking and unauthorized administrative access to the PrestaShop backend. The vulnerability affects all versions of the productcomments module prior to version 5.0.2, where the issue has been fixed. There are no known exploits in the wild as of the published date (September 2022), but the nature of XSS vulnerabilities makes them relatively easy to exploit if the vulnerable module is in use and unpatched. The attack requires that an attacker can submit content that will be viewed by an administrator, but does not require prior authentication or complex conditions beyond that. The vulnerability impacts confidentiality and integrity by enabling theft of admin cookies and potential unauthorized actions within the PrestaShop administration interface. Availability is less directly impacted but could be affected if the attacker uses the access to disrupt services or modify content maliciously.
Potential Impact
For European organizations using PrestaShop e-commerce platforms with the vulnerable productcomments module, this vulnerability poses a significant risk to the confidentiality and integrity of their online store management. Successful exploitation could lead to unauthorized administrative access, enabling attackers to manipulate product listings, customer data, order information, and potentially inject further malicious content affecting customers. This could result in financial losses, reputational damage, and regulatory compliance issues under GDPR due to potential exposure of personal data. The impact is particularly critical for medium to large online retailers who rely heavily on PrestaShop for their sales operations. The ability to hijack admin sessions could also facilitate further lateral attacks within the organization's network. Although no known active exploits have been reported, the ease of exploitation and the widespread use of PrestaShop in Europe make timely patching essential to prevent potential attacks.
Mitigation Recommendations
1. Immediate upgrade of the PrestaShop productcomments module to version 5.0.2 or later to apply the official fix. 2. Implement strict input validation and output encoding on all user-generated content, especially product reviews and comments, to prevent injection of malicious scripts. 3. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in the admin interface. 4. Limit administrative interface access to trusted IP addresses or via VPN to reduce exposure. 5. Enable multi-factor authentication (MFA) for all administrator accounts to mitigate the impact of stolen cookies. 6. Regularly audit and monitor logs for unusual administrative activities that could indicate exploitation attempts. 7. Educate administrators to be cautious when reviewing user-generated content and to report suspicious behavior. 8. Consider implementing web application firewalls (WAF) with rules to detect and block XSS payloads targeting the productcomments module.
Affected Countries
France, Germany, United Kingdom, Italy, Spain, Netherlands, Belgium, Poland
CVE-2022-35933: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in PrestaShop productcomments
Description
This package is a PrestaShop module that allows users to post reviews and rate products. There is a vulnerability where the attacker could steal an administrator's cookie. The issue is fixed in version 5.0.2.
AI-Powered Analysis
Technical Analysis
CVE-2022-35933 is a cross-site scripting (XSS) vulnerability identified in the PrestaShop 'productcomments' module, which is used to allow users to post reviews and rate products on e-commerce websites running the PrestaShop platform. The vulnerability arises due to improper neutralization of input during web page generation (CWE-79), specifically allowing malicious input to be injected and executed in the context of an administrator's browser session. An attacker exploiting this vulnerability can craft a specially designed input (such as a product review containing malicious JavaScript) that, when viewed by an administrator, executes in their browser and can steal sensitive information such as authentication cookies. This can lead to session hijacking and unauthorized administrative access to the PrestaShop backend. The vulnerability affects all versions of the productcomments module prior to version 5.0.2, where the issue has been fixed. There are no known exploits in the wild as of the published date (September 2022), but the nature of XSS vulnerabilities makes them relatively easy to exploit if the vulnerable module is in use and unpatched. The attack requires that an attacker can submit content that will be viewed by an administrator, but does not require prior authentication or complex conditions beyond that. The vulnerability impacts confidentiality and integrity by enabling theft of admin cookies and potential unauthorized actions within the PrestaShop administration interface. Availability is less directly impacted but could be affected if the attacker uses the access to disrupt services or modify content maliciously.
Potential Impact
For European organizations using PrestaShop e-commerce platforms with the vulnerable productcomments module, this vulnerability poses a significant risk to the confidentiality and integrity of their online store management. Successful exploitation could lead to unauthorized administrative access, enabling attackers to manipulate product listings, customer data, order information, and potentially inject further malicious content affecting customers. This could result in financial losses, reputational damage, and regulatory compliance issues under GDPR due to potential exposure of personal data. The impact is particularly critical for medium to large online retailers who rely heavily on PrestaShop for their sales operations. The ability to hijack admin sessions could also facilitate further lateral attacks within the organization's network. Although no known active exploits have been reported, the ease of exploitation and the widespread use of PrestaShop in Europe make timely patching essential to prevent potential attacks.
Mitigation Recommendations
1. Immediate upgrade of the PrestaShop productcomments module to version 5.0.2 or later to apply the official fix. 2. Implement strict input validation and output encoding on all user-generated content, especially product reviews and comments, to prevent injection of malicious scripts. 3. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in the admin interface. 4. Limit administrative interface access to trusted IP addresses or via VPN to reduce exposure. 5. Enable multi-factor authentication (MFA) for all administrator accounts to mitigate the impact of stolen cookies. 6. Regularly audit and monitor logs for unusual administrative activities that could indicate exploitation attempts. 7. Educate administrators to be cautious when reviewing user-generated content and to report suspicious behavior. 8. Consider implementing web application firewalls (WAF) with rules to detect and block XSS payloads targeting the productcomments module.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-07-15T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9844c4522896dcbf3c3f
Added to database: 5/21/2025, 9:09:24 AM
Last enriched: 6/22/2025, 11:07:09 PM
Last updated: 2/7/2026, 12:06:21 PM
Views: 39
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2084: OS Command Injection in D-Link DIR-823X
HighCVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.