CVE-2024-36678: n/a
CVE-2024-36678 is a critical SQL injection vulnerability found in the 'Theme settings' module (pk_themesettings) version 1. 8. 8 and earlier from Promokit. eu for PrestaShop. The vulnerability allows an unauthenticated guest user to exploit a sensitive SQL call via the ajax. php script using a simple HTTP request, leading to full compromise of the database confidentiality, integrity, and availability. This flaw requires no authentication or user interaction and can be exploited remotely over the network. The vulnerability is rated with a CVSS 3. 1 score of 9. 8, indicating a critical severity level.
AI Analysis
Technical Summary
CVE-2024-36678 is a critical SQL injection vulnerability identified in the 'Theme settings' module (pk_themesettings) version 1.8.8 and earlier, developed by Promokit.eu for the PrestaShop e-commerce platform. The vulnerability resides in the ajax.php script, which contains a sensitive SQL query that can be manipulated by an unauthenticated attacker through a crafted HTTP request. This injection flaw allows attackers to execute arbitrary SQL commands on the backend database, potentially leading to unauthorized data disclosure, data modification, or complete database destruction. The vulnerability is classified under CWE-89 (Improper Neutralization of Special Elements used in an SQL Command). The exploit requires no privileges or user interaction and can be triggered remotely, making it highly dangerous. The CVSS v3.1 base score of 9.8 reflects the vulnerability's high impact on confidentiality, integrity, and availability, combined with its ease of exploitation over the network. No patches or official fixes have been published at the time of disclosure, and no known exploits are currently in the wild, but the risk remains significant for affected systems.
Potential Impact
The impact of CVE-2024-36678 on organizations using the vulnerable PrestaShop module is severe. Exploitation can lead to full compromise of the underlying database, exposing sensitive customer data such as personal information, payment details, and order histories. Attackers could also modify or delete critical data, disrupt e-commerce operations, or implant persistent backdoors for further exploitation. Given the unauthenticated nature of the vulnerability, any external attacker can exploit it remotely without prior access, increasing the attack surface significantly. This can result in financial losses, reputational damage, regulatory penalties, and loss of customer trust. Organizations relying on PrestaShop with this module should consider the vulnerability a critical threat to their e-commerce infrastructure and data security.
Mitigation Recommendations
To mitigate CVE-2024-36678, organizations should immediately audit their PrestaShop installations for the presence of the vulnerable 'Theme settings' module (pk_themesettings) version 1.8.8 or earlier. If possible, disable or remove the module until a patch is available. Since no official patch is currently published, organizations should implement web application firewall (WAF) rules to detect and block suspicious SQL injection patterns targeting ajax.php requests. Employ strict input validation and parameterized queries if custom modifications are feasible. Monitor web server logs for unusual or malformed HTTP requests to ajax.php. Additionally, restrict access to ajax.php via IP whitelisting or authentication mechanisms where possible. Regularly back up databases and test restoration procedures to minimize damage in case of exploitation. Stay updated with Promokit.eu and PrestaShop advisories for official patches or updates.
Affected Countries
United States, Germany, France, United Kingdom, Canada, Australia, Netherlands, Italy, Spain, Brazil
CVE-2024-36678: n/a
Description
CVE-2024-36678 is a critical SQL injection vulnerability found in the 'Theme settings' module (pk_themesettings) version 1. 8. 8 and earlier from Promokit. eu for PrestaShop. The vulnerability allows an unauthenticated guest user to exploit a sensitive SQL call via the ajax. php script using a simple HTTP request, leading to full compromise of the database confidentiality, integrity, and availability. This flaw requires no authentication or user interaction and can be exploited remotely over the network. The vulnerability is rated with a CVSS 3. 1 score of 9. 8, indicating a critical severity level.
AI-Powered Analysis
Technical Analysis
CVE-2024-36678 is a critical SQL injection vulnerability identified in the 'Theme settings' module (pk_themesettings) version 1.8.8 and earlier, developed by Promokit.eu for the PrestaShop e-commerce platform. The vulnerability resides in the ajax.php script, which contains a sensitive SQL query that can be manipulated by an unauthenticated attacker through a crafted HTTP request. This injection flaw allows attackers to execute arbitrary SQL commands on the backend database, potentially leading to unauthorized data disclosure, data modification, or complete database destruction. The vulnerability is classified under CWE-89 (Improper Neutralization of Special Elements used in an SQL Command). The exploit requires no privileges or user interaction and can be triggered remotely, making it highly dangerous. The CVSS v3.1 base score of 9.8 reflects the vulnerability's high impact on confidentiality, integrity, and availability, combined with its ease of exploitation over the network. No patches or official fixes have been published at the time of disclosure, and no known exploits are currently in the wild, but the risk remains significant for affected systems.
Potential Impact
The impact of CVE-2024-36678 on organizations using the vulnerable PrestaShop module is severe. Exploitation can lead to full compromise of the underlying database, exposing sensitive customer data such as personal information, payment details, and order histories. Attackers could also modify or delete critical data, disrupt e-commerce operations, or implant persistent backdoors for further exploitation. Given the unauthenticated nature of the vulnerability, any external attacker can exploit it remotely without prior access, increasing the attack surface significantly. This can result in financial losses, reputational damage, regulatory penalties, and loss of customer trust. Organizations relying on PrestaShop with this module should consider the vulnerability a critical threat to their e-commerce infrastructure and data security.
Mitigation Recommendations
To mitigate CVE-2024-36678, organizations should immediately audit their PrestaShop installations for the presence of the vulnerable 'Theme settings' module (pk_themesettings) version 1.8.8 or earlier. If possible, disable or remove the module until a patch is available. Since no official patch is currently published, organizations should implement web application firewall (WAF) rules to detect and block suspicious SQL injection patterns targeting ajax.php requests. Employ strict input validation and parameterized queries if custom modifications are feasible. Monitor web server logs for unusual or malformed HTTP requests to ajax.php. Additionally, restrict access to ajax.php via IP whitelisting or authentication mechanisms where possible. Regularly back up databases and test restoration procedures to minimize damage in case of exploitation. Stay updated with Promokit.eu and PrestaShop advisories for official patches or updates.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-05-30T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6c63b7ef31ef0b5638ff
Added to database: 2/25/2026, 9:40:51 PM
Last enriched: 2/26/2026, 5:09:47 AM
Last updated: 2/26/2026, 8:00:50 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumCVE-2026-2499: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tgrk Custom Logo
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.