CVE-2023-50027: n/a in n/a
SQL Injection vulnerability in Buy Addons baproductzoommagnifier module for PrestaShop versions 1.0.16 and before, allows remote attackers to escalate privileges and gain sensitive information via BaproductzoommagnifierZoomModuleFrontController::run() method.
AI Analysis
Technical Summary
CVE-2023-50027 is a critical SQL Injection vulnerability affecting the Buy Addons baproductzoommagnifier module used in PrestaShop versions 1.0.16 and earlier. The vulnerability exists in the BaproductzoommagnifierZoomModuleFrontController::run() method, which does not properly sanitize user input before incorporating it into SQL queries. This flaw allows remote attackers to execute arbitrary SQL commands on the backend database without requiring authentication or user interaction. Exploiting this vulnerability can lead to privilege escalation, enabling attackers to gain unauthorized access to sensitive information such as customer data, payment details, or administrative credentials. The vulnerability is rated with a CVSS 3.1 score of 9.8, indicating a critical severity level due to its network attack vector, low attack complexity, no privileges required, and no user interaction needed. The impact on confidentiality, integrity, and availability is high, as attackers can manipulate database contents, extract sensitive data, or disrupt service availability. Although no public exploits are currently known, the high severity and ease of exploitation make this a significant threat to any PrestaShop installations using the affected module version.
Potential Impact
For European organizations, especially those operating e-commerce platforms using PrestaShop with the vulnerable baproductzoommagnifier module, this vulnerability poses a severe risk. Exploitation could lead to data breaches involving personal customer information protected under GDPR, resulting in legal penalties and reputational damage. Financial data exposure could lead to fraud and financial loss. The ability to escalate privileges may allow attackers to take over administrative functions, potentially leading to website defacement, insertion of malicious code, or complete service disruption. Given the widespread use of PrestaShop among small and medium-sized enterprises in Europe, the threat could impact a broad range of businesses, from retail to services, undermining customer trust and operational continuity.
Mitigation Recommendations
Immediate mitigation steps include upgrading the baproductzoommagnifier module to a patched version once available from the vendor or disabling the module if an update is not yet released. In the interim, organizations should implement Web Application Firewall (WAF) rules specifically designed to detect and block SQL injection attempts targeting the vulnerable module's endpoints. Conduct thorough input validation and sanitization on all user inputs, especially those interacting with the module. Regularly audit database access logs for suspicious queries indicative of exploitation attempts. Employ database user accounts with the least privileges necessary to limit the impact of any successful injection. Additionally, organizations should monitor threat intelligence feeds for any emerging exploits and apply security patches promptly. Conduct penetration testing focused on SQL injection vectors to identify any residual vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2023-50027: n/a in n/a
Description
SQL Injection vulnerability in Buy Addons baproductzoommagnifier module for PrestaShop versions 1.0.16 and before, allows remote attackers to escalate privileges and gain sensitive information via BaproductzoommagnifierZoomModuleFrontController::run() method.
AI-Powered Analysis
Technical Analysis
CVE-2023-50027 is a critical SQL Injection vulnerability affecting the Buy Addons baproductzoommagnifier module used in PrestaShop versions 1.0.16 and earlier. The vulnerability exists in the BaproductzoommagnifierZoomModuleFrontController::run() method, which does not properly sanitize user input before incorporating it into SQL queries. This flaw allows remote attackers to execute arbitrary SQL commands on the backend database without requiring authentication or user interaction. Exploiting this vulnerability can lead to privilege escalation, enabling attackers to gain unauthorized access to sensitive information such as customer data, payment details, or administrative credentials. The vulnerability is rated with a CVSS 3.1 score of 9.8, indicating a critical severity level due to its network attack vector, low attack complexity, no privileges required, and no user interaction needed. The impact on confidentiality, integrity, and availability is high, as attackers can manipulate database contents, extract sensitive data, or disrupt service availability. Although no public exploits are currently known, the high severity and ease of exploitation make this a significant threat to any PrestaShop installations using the affected module version.
Potential Impact
For European organizations, especially those operating e-commerce platforms using PrestaShop with the vulnerable baproductzoommagnifier module, this vulnerability poses a severe risk. Exploitation could lead to data breaches involving personal customer information protected under GDPR, resulting in legal penalties and reputational damage. Financial data exposure could lead to fraud and financial loss. The ability to escalate privileges may allow attackers to take over administrative functions, potentially leading to website defacement, insertion of malicious code, or complete service disruption. Given the widespread use of PrestaShop among small and medium-sized enterprises in Europe, the threat could impact a broad range of businesses, from retail to services, undermining customer trust and operational continuity.
Mitigation Recommendations
Immediate mitigation steps include upgrading the baproductzoommagnifier module to a patched version once available from the vendor or disabling the module if an update is not yet released. In the interim, organizations should implement Web Application Firewall (WAF) rules specifically designed to detect and block SQL injection attempts targeting the vulnerable module's endpoints. Conduct thorough input validation and sanitization on all user inputs, especially those interacting with the module. Regularly audit database access logs for suspicious queries indicative of exploitation attempts. Employ database user accounts with the least privileges necessary to limit the impact of any successful injection. Additionally, organizations should monitor threat intelligence feeds for any emerging exploits and apply security patches promptly. Conduct penetration testing focused on SQL injection vectors to identify any residual vulnerabilities.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2023-12-04T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683f0dc2182aa0cae27ff39b
Added to database: 6/3/2025, 2:59:14 PM
Last enriched: 7/4/2025, 3:09:31 AM
Last updated: 12/3/2025, 11:09:55 PM
Views: 28
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-64055: n/a
UnknownCVE-2025-66404: CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') in Flux159 mcp-server-kubernetes
MediumCVE-2025-66293: CWE-125: Out-of-bounds Read in pnggroup libpng
HighCVE-2025-65868: n/a
UnknownCVE-2023-0842: Prototype Pollution in xml2js
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.