Skip to main content

CVE-2022-46158: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in PrestaShop PrestaShop

Medium
Published: Thu Dec 08 2022 (12/08/2022, 21:50:44 UTC)
Source: CVE
Vendor/Project: PrestaShop
Product: PrestaShop

Description

PrestaShop is an open-source e-commerce solution. Versions prior to 1.7.8.8 did not properly restrict host filesystem access for users. Users may have been able to view the contents of the upload directory without appropriate permissions. This issue has been addressed and users are advised to upgrade to version 1.7.8.8. There are no known workarounds for this issue.

AI-Powered Analysis

AILast updated: 06/22/2025, 11:20:43 UTC

Technical Analysis

CVE-2022-46158 is a vulnerability identified in PrestaShop, an open-source e-commerce platform widely used for online retail operations. The issue affects all versions prior to 1.7.8.8 and relates to improper access control on the host filesystem, specifically concerning the upload directory. Due to insufficient restrictions, unauthorized users could potentially access and view the contents of this directory without appropriate permissions. This exposure constitutes a CWE-200 vulnerability, which involves the exposure of sensitive information to unauthorized actors. The upload directory in e-commerce platforms often contains user-uploaded files, product images, or other data that may include sensitive business or customer information. Although there are no known exploits actively observed in the wild, the vulnerability presents a risk of unauthorized data disclosure. The flaw was addressed in PrestaShop version 1.7.8.8, and upgrading to this version or later is the recommended remediation. No alternative workarounds are available, emphasizing the importance of patching. The vulnerability does not require authentication or user interaction to be exploited, as it stems from improper filesystem access controls, potentially allowing remote attackers to enumerate or download files from the upload directory. This could lead to leakage of sensitive business data, customer information, or intellectual property, depending on what files are stored in the affected directory.

Potential Impact

For European organizations using PrestaShop versions prior to 1.7.8.8, this vulnerability could lead to unauthorized disclosure of sensitive information, impacting confidentiality. Exposure of customer data or internal business files could result in reputational damage, regulatory non-compliance (notably under GDPR), and potential financial losses. While the vulnerability does not directly affect system integrity or availability, the leakage of sensitive data could facilitate further attacks such as social engineering or targeted phishing campaigns. E-commerce businesses, especially SMEs relying on PrestaShop for online sales, are at risk of data breaches that could undermine customer trust and lead to legal consequences. The impact is heightened in sectors handling sensitive personal data or payment information. Given the lack of known exploits, the immediate risk is moderate; however, the ease of exploitation due to missing access controls means that attackers with minimal technical skills could leverage this vulnerability if unpatched systems are exposed to the internet.

Mitigation Recommendations

The primary and most effective mitigation is to upgrade PrestaShop installations to version 1.7.8.8 or later, where the vulnerability has been fixed. Organizations should prioritize patch management processes to ensure timely updates. Additionally, administrators should review and restrict access permissions on the upload directory at the web server and filesystem levels, implementing strict access control lists (ACLs) to prevent unauthorized browsing or downloading of files. Employing web application firewalls (WAFs) to monitor and block suspicious requests targeting the upload directory can provide an additional layer of defense. Regular security audits and file integrity monitoring should be conducted to detect unauthorized access or changes. Organizations should also ensure that sensitive files are not stored in publicly accessible directories and consider encrypting sensitive data at rest. Finally, monitoring logs for unusual access patterns related to the upload directory can help in early detection of exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-11-28T17:27:19.997Z
Cisa Enriched
true

Threat ID: 682d9846c4522896dcbf4ee9

Added to database: 5/21/2025, 9:09:26 AM

Last enriched: 6/22/2025, 11:20:43 AM

Last updated: 8/4/2025, 4:40:40 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats