Skip to main content

CVE-2022-35933: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in PrestaShop productcomments

Medium
Published: Fri Sep 02 2022 (09/02/2022, 19:30:14 UTC)
Source: CVE
Vendor/Project: PrestaShop
Product: productcomments

Description

This package is a PrestaShop module that allows users to post reviews and rate products. There is a vulnerability where the attacker could steal an administrator's cookie. The issue is fixed in version 5.0.2.

AI-Powered Analysis

AILast updated: 06/22/2025, 23:07:09 UTC

Technical Analysis

CVE-2022-35933 is a cross-site scripting (XSS) vulnerability identified in the PrestaShop 'productcomments' module, which is used to allow users to post reviews and rate products on e-commerce websites running the PrestaShop platform. The vulnerability arises due to improper neutralization of input during web page generation (CWE-79), specifically allowing malicious input to be injected and executed in the context of an administrator's browser session. An attacker exploiting this vulnerability can craft a specially designed input (such as a product review containing malicious JavaScript) that, when viewed by an administrator, executes in their browser and can steal sensitive information such as authentication cookies. This can lead to session hijacking and unauthorized administrative access to the PrestaShop backend. The vulnerability affects all versions of the productcomments module prior to version 5.0.2, where the issue has been fixed. There are no known exploits in the wild as of the published date (September 2022), but the nature of XSS vulnerabilities makes them relatively easy to exploit if the vulnerable module is in use and unpatched. The attack requires that an attacker can submit content that will be viewed by an administrator, but does not require prior authentication or complex conditions beyond that. The vulnerability impacts confidentiality and integrity by enabling theft of admin cookies and potential unauthorized actions within the PrestaShop administration interface. Availability is less directly impacted but could be affected if the attacker uses the access to disrupt services or modify content maliciously.

Potential Impact

For European organizations using PrestaShop e-commerce platforms with the vulnerable productcomments module, this vulnerability poses a significant risk to the confidentiality and integrity of their online store management. Successful exploitation could lead to unauthorized administrative access, enabling attackers to manipulate product listings, customer data, order information, and potentially inject further malicious content affecting customers. This could result in financial losses, reputational damage, and regulatory compliance issues under GDPR due to potential exposure of personal data. The impact is particularly critical for medium to large online retailers who rely heavily on PrestaShop for their sales operations. The ability to hijack admin sessions could also facilitate further lateral attacks within the organization's network. Although no known active exploits have been reported, the ease of exploitation and the widespread use of PrestaShop in Europe make timely patching essential to prevent potential attacks.

Mitigation Recommendations

1. Immediate upgrade of the PrestaShop productcomments module to version 5.0.2 or later to apply the official fix. 2. Implement strict input validation and output encoding on all user-generated content, especially product reviews and comments, to prevent injection of malicious scripts. 3. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in the admin interface. 4. Limit administrative interface access to trusted IP addresses or via VPN to reduce exposure. 5. Enable multi-factor authentication (MFA) for all administrator accounts to mitigate the impact of stolen cookies. 6. Regularly audit and monitor logs for unusual administrative activities that could indicate exploitation attempts. 7. Educate administrators to be cautious when reviewing user-generated content and to report suspicious behavior. 8. Consider implementing web application firewalls (WAF) with rules to detect and block XSS payloads targeting the productcomments module.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-07-15T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9844c4522896dcbf3c3f

Added to database: 5/21/2025, 9:09:24 AM

Last enriched: 6/22/2025, 11:07:09 PM

Last updated: 7/29/2025, 3:21:00 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats