Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-25846: n/a

0
Critical
VulnerabilityCVE-2024-25846cvecve-2024-25846
Published: Tue Feb 27 2024 (02/27/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-25846 is a critical vulnerability in the "Product Catalog (CSV, Excel) Import" module (simpleimportproduct) version 6. 7. 0 and earlier from MyPrestaModules for PrestaShop. It allows unauthenticated guest users to upload files with dangerous . php extensions, leading to remote code execution. The vulnerability stems from improper validation of uploaded file types (CWE-434). Exploitation requires no user interaction and can be performed remotely over the network. The CVSS score is 9. 1, reflecting high impact on confidentiality, integrity, and availability with low attack complexity but requiring high privileges. No public exploits are currently known.

AI-Powered Analysis

AILast updated: 02/26/2026, 10:47:02 UTC

Technical Analysis

CVE-2024-25846 is a critical security vulnerability identified in the "Product Catalog (CSV, Excel) Import" module (simpleimportproduct) for PrestaShop, specifically versions 6.7.0 and earlier. This module is designed to facilitate bulk import of product data via CSV or Excel files. However, due to insufficient validation of uploaded file extensions, unauthenticated guest users can upload files with .php extensions. This improper validation corresponds to CWE-434 (Unrestricted Upload of File with Dangerous Type). The ability to upload .php files enables attackers to execute arbitrary PHP code on the server, effectively allowing remote code execution (RCE). The vulnerability has a CVSS v3.1 base score of 9.1, indicating critical severity. The attack vector is network-based (AV:N), with low attack complexity (AC:L), but requires high privileges (PR:H), which suggests that some form of elevated access or bypass might be needed, though the description states a guest can upload files, implying a potential discrepancy or that the module's access controls are weak or misconfigured. The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. The impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), as attackers can fully compromise the system. No public exploits are currently known, but the vulnerability's nature makes it a prime target for exploitation once weaponized. The lack of available patches at the time of publication increases urgency for mitigation. This vulnerability threatens the security of e-commerce platforms using PrestaShop with this module, potentially leading to full server compromise, data theft, defacement, or service disruption.

Potential Impact

The impact of CVE-2024-25846 is severe for organizations running PrestaShop with the vulnerable Product Catalog Import module. Successful exploitation allows attackers to upload and execute arbitrary PHP scripts, leading to remote code execution. This can result in full system compromise, including unauthorized access to sensitive customer data, modification or deletion of product catalogs, theft of payment information, and disruption of e-commerce operations. Attackers could also use compromised servers as pivot points for lateral movement within corporate networks or to launch further attacks such as ransomware deployment. The vulnerability undermines the confidentiality, integrity, and availability of the affected systems, potentially causing significant financial loss, reputational damage, and regulatory penalties. Given PrestaShop's global usage in online retail, the threat extends to a wide range of industries relying on e-commerce platforms. The absence of known public exploits currently provides a narrow window for remediation before attackers develop and deploy exploit code.

Mitigation Recommendations

To mitigate CVE-2024-25846, organizations should immediately implement strict file upload validation controls to restrict accepted file types to only CSV and Excel formats, explicitly blocking .php and other executable extensions. Employ server-side validation rather than relying solely on client-side checks. Disable or restrict guest user permissions to prevent unauthorized file uploads. Monitor web server logs and application logs for suspicious upload attempts or unexpected file creations. Use web application firewalls (WAFs) to detect and block malicious upload patterns. Apply any available patches or updates from MyPrestaModules or PrestaShop as soon as they are released. If patches are unavailable, consider temporarily disabling the vulnerable module or replacing it with a secure alternative. Conduct regular security audits and penetration testing focused on file upload functionalities. Implement network segmentation to limit the impact of a potential compromise. Backup critical data frequently and ensure backups are stored securely offline to enable recovery in case of an attack.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-02-12T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d71b7ef31ef0b572331

Added to database: 2/25/2026, 9:45:21 PM

Last enriched: 2/26/2026, 10:47:02 AM

Last updated: 2/26/2026, 11:08:41 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats