Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-28396: n/a

0
High
VulnerabilityCVE-2024-28396cvecve-2024-28396
Published: Wed Mar 20 2024 (03/20/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue in MyPrestaModules ordersexport v.6.0.2 and before allows a remote attacker to execute arbitrary code via the download.php component.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 18:56:53 UTC

Technical Analysis

CVE-2024-28396 is a remote code execution (RCE) vulnerability found in the MyPrestaModules ordersexport plugin, specifically in versions 6.0.2 and earlier. The vulnerability resides in the download.php component, which improperly handles user input, enabling an attacker to inject and execute arbitrary code on the server. This is categorized under CWE-94, which involves improper control of code generation, often leading to RCE. The vulnerability requires no authentication or user interaction, making it highly exploitable remotely over the network. The CVSS 3.1 base score of 7.5 reflects a high severity primarily due to the potential confidentiality breach, as attackers can execute code and potentially access sensitive data. The flaw does not directly affect integrity or availability but can lead to further compromise. No patches or fixes are currently linked, and no exploits have been publicly observed in the wild yet. However, the presence of such a vulnerability in an e-commerce module that handles order exports poses a significant risk to merchants using PrestaShop platforms, potentially allowing attackers to take over web servers, steal customer data, or deploy malware.

Potential Impact

The vulnerability allows remote attackers to execute arbitrary code without authentication or user interaction, which can lead to full compromise of the affected web server hosting the PrestaShop module. This can result in unauthorized access to sensitive customer and order data, theft of payment information, and potential disruption of e-commerce operations. Attackers could also use the compromised server as a foothold for lateral movement within an organization’s network or to launch further attacks. The confidentiality of business and customer data is at high risk, which can lead to reputational damage, financial loss, and regulatory penalties. Since the vulnerability affects a widely used e-commerce plugin, the scope of impact is broad, especially for small to medium-sized online retailers relying on this module for order management.

Mitigation Recommendations

Organizations should immediately verify if they are using MyPrestaModules ordersexport version 6.0.2 or earlier and disable or isolate the affected download.php component until a patch is available. Implement strict input validation and sanitization on all user-supplied data to prevent code injection. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting download.php. Monitor server logs for unusual activity indicative of exploitation attempts. Restrict access to the download.php endpoint by IP whitelisting or authentication where feasible. Regularly update all PrestaShop modules and monitor vendor advisories for patches. Conduct security audits and penetration testing focused on plugin components. Consider deploying runtime application self-protection (RASP) solutions to detect and block exploitation in real-time.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-03-08T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d8fb7ef31ef0b58892f

Added to database: 2/25/2026, 9:45:51 PM

Last enriched: 2/26/2026, 6:56:53 PM

Last updated: 4/12/2026, 3:47:18 PM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses