Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-33836: n/a

0
Critical
VulnerabilityCVE-2024-33836cvecve-2024-33836
Published: Wed Jun 19 2024 (06/19/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

In the module "JA Marketplace" (jamarketplace) up to version 9.0.1 from JA Module for PrestaShop, a guest can upload files with extensions .php. In version 6.X, the method `JmarketplaceproductModuleFrontController::init()` and in version 8.X, the method `JmarketplaceSellerproductModuleFrontController::init()` allow upload of .php files, which will lead to a critical vulnerability.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 03:02:36 UTC

Technical Analysis

CVE-2024-33836 is a critical security vulnerability identified in the JA Marketplace module for PrestaShop, a widely used e-commerce platform. The vulnerability affects versions up to 9.0.1 and involves improper validation of file uploads in two specific controller methods: JmarketplaceproductModuleFrontController::init() in version 6.X and JmarketplaceSellerproductModuleFrontController::init() in version 8.X. These methods allow unauthenticated guest users to upload files with .php extensions without proper sanitization or restriction. This unrestricted file upload vulnerability (CWE-434) enables attackers to upload malicious PHP scripts, which can then be executed on the server, leading to remote code execution (RCE). The vulnerability requires no authentication or user interaction, making it trivially exploitable over the network. The CVSS v3.1 base score of 9.8 reflects the high impact on confidentiality, integrity, and availability, as attackers can fully compromise the affected server, steal sensitive data, modify or delete data, and disrupt services. Although no known exploits are publicly reported yet, the nature of the vulnerability and ease of exploitation make it a critical threat. The lack of official patches at the time of publication necessitates immediate attention from administrators to apply any forthcoming updates or employ alternative mitigations. This vulnerability highlights the risks of insufficient input validation and file upload controls in web applications, especially in e-commerce environments where guest user interactions are common.

Potential Impact

The impact of CVE-2024-33836 is severe for organizations running the JA Marketplace module on PrestaShop. Successful exploitation allows attackers to upload and execute arbitrary PHP code on the web server, leading to full system compromise. This can result in data breaches exposing customer and business information, unauthorized modification or deletion of data, installation of backdoors or malware, and disruption of e-commerce operations. Given that the vulnerability requires no authentication or user interaction, attackers can remotely exploit it at scale, potentially affecting many organizations simultaneously. The compromise of e-commerce platforms can damage brand reputation, cause financial losses, and lead to regulatory penalties due to data protection violations. Additionally, attackers could leverage compromised servers as pivot points for further attacks within an organization's network. The widespread use of PrestaShop in global e-commerce increases the potential attack surface and risk exposure.

Mitigation Recommendations

To mitigate CVE-2024-33836, organizations should immediately upgrade the JA Marketplace module to a version where this vulnerability is patched once available. Until an official patch is released, implement strict file upload restrictions by configuring the web server or application firewall to block uploads of executable file types such as .php. Employ web application firewalls (WAFs) with rules to detect and block malicious file upload attempts targeting the vulnerable endpoints. Disable or restrict guest user file upload capabilities if feasible. Conduct thorough code reviews and add server-side validation to ensure only allowed file types are accepted. Monitor web server logs for suspicious upload activity and unauthorized access attempts. Isolate the PrestaShop environment from critical internal networks to limit lateral movement in case of compromise. Regularly back up data and test restoration procedures to minimize downtime and data loss. Finally, maintain awareness of vendor advisories and apply security updates promptly.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-04-26T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c47b7ef31ef0b561d95

Added to database: 2/25/2026, 9:40:23 PM

Last enriched: 2/28/2026, 3:02:36 AM

Last updated: 4/12/2026, 5:11:44 PM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses