Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-36626: n/a

0
Medium
VulnerabilityCVE-2024-36626cvecve-2024-36626
Published: Fri Nov 29 2024 (11/29/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-36626 is a medium severity vulnerability found in PrestaShop version 8. 1. 4 involving a NULL pointer dereference in the math_round function within Tools. php. This flaw can cause a denial of service by crashing the application when the vulnerable function is invoked with unexpected input. The vulnerability does not impact confidentiality or integrity but affects availability. It can be exploited remotely without authentication or user interaction, making it accessible to unauthenticated attackers over the network. No known exploits are currently reported in the wild, and no patches have been linked yet. Organizations using PrestaShop 8. 1.

AI-Powered Analysis

AILast updated: 02/26/2026, 05:08:00 UTC

Technical Analysis

CVE-2024-36626 is a vulnerability identified in PrestaShop version 8.1.4, specifically a NULL pointer dereference in the math_round function located in the Tools.php file. This function is responsible for rounding numeric values, and the flaw arises when it attempts to dereference a NULL pointer due to improper input validation or unexpected data conditions. The NULL pointer dereference leads to an application crash, resulting in a denial of service (DoS) condition. The vulnerability is remotely exploitable over the network without requiring any privileges or user interaction, increasing its risk profile. However, it does not allow attackers to gain unauthorized access, modify data, or disclose sensitive information. The vulnerability is categorized under CWE-476, which involves dereferencing a pointer that may be NULL, causing program instability or crashes. The CVSS v3.1 score of 5.3 reflects a medium severity, primarily due to the impact on availability and ease of exploitation. No patches or fixes have been officially released at the time of this report, and no active exploitation has been observed in the wild. This vulnerability could be triggered by specially crafted requests or inputs that reach the math_round function, causing the PrestaShop application to terminate unexpectedly and disrupt e-commerce operations.

Potential Impact

The primary impact of CVE-2024-36626 is denial of service, which can disrupt the availability of e-commerce websites running PrestaShop 8.1.4. This disruption can lead to loss of revenue, customer trust, and operational downtime. Since the vulnerability does not affect confidentiality or integrity, data breaches or unauthorized modifications are not a concern for this specific flaw. However, the ease of remote exploitation without authentication means attackers can cause service outages at scale, potentially as part of larger attack campaigns or to damage business reputation. Organizations relying on PrestaShop for online sales may experience intermittent or prolonged outages, affecting customer experience and business continuity. The lack of known exploits in the wild reduces immediate risk but does not eliminate the potential for future attacks once exploit code becomes available. The impact is more pronounced for businesses with high traffic volumes or those lacking robust incident response and redundancy measures.

Mitigation Recommendations

To mitigate CVE-2024-36626, organizations should first monitor PrestaShop vendor communications for official patches or updates addressing this vulnerability and apply them promptly once available. In the interim, review and restrict access to the affected PrestaShop instances by implementing network-level controls such as web application firewalls (WAFs) to detect and block anomalous requests that could trigger the NULL pointer dereference. Conduct code audits or add input validation around the math_round function if custom modifications are feasible, ensuring that inputs are sanitized and NULL values are handled safely. Employ redundancy and failover mechanisms to minimize downtime in case of service crashes. Additionally, maintain comprehensive logging and monitoring to detect unusual application crashes or service interruptions that may indicate exploitation attempts. Educate development and operations teams about this vulnerability to ensure rapid response and containment. Avoid exposing PrestaShop administrative interfaces directly to the internet where possible, and enforce strict access controls.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-05-30T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c63b7ef31ef0b5638e1

Added to database: 2/25/2026, 9:40:51 PM

Last enriched: 2/26/2026, 5:08:00 AM

Last updated: 2/26/2026, 6:13:23 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats