CVE-2025-61922: CWE-287: Improper Authentication in PrestaShopCorp ps_checkout
PrestaShop Checkout is the PrestaShop official payment module in partnership with PayPal. Starting in version 1.3.0 and prior to versions 4.4.1 and 5.0.5, missing validation on the Express Checkout feature allows silent login, enabling account takeover via email. The vulnerability is fixed in versions 4.4.1 and 5.0.5. No known workarounds exist.
AI Analysis
Technical Summary
CVE-2025-61922 is a critical security vulnerability classified under CWE-287 (Improper Authentication) found in the PrestaShopCorp ps_checkout module, which is the official payment module integrated with PayPal. The vulnerability exists in versions starting from 1.3.0 up to but excluding 4.4.1, and from 5.0.0 up to but excluding 5.0.5. The root cause is a missing validation step in the Express Checkout feature, which allows an attacker to bypass authentication controls and silently log into user accounts using only their email addresses. This silent login effectively enables account takeover without requiring user interaction, credentials, or elevated privileges. The vulnerability has a CVSS v3.1 score of 9.1, indicating critical severity, with an attack vector of network (remote), no required privileges, no user interaction, and high impact on confidentiality and integrity, but no impact on availability. The vulnerability was publicly disclosed on October 16, 2025, and no known exploits have been observed in the wild to date. The issue is resolved in versions 4.4.1 and 5.0.5 of the ps_checkout module. Due to the lack of workarounds, affected organizations must upgrade promptly to mitigate risk. The vulnerability poses a significant threat to e-commerce platforms using PrestaShop, potentially allowing attackers to hijack user accounts, manipulate orders, or commit fraud.
Potential Impact
For European organizations, especially those operating e-commerce platforms using PrestaShop with the vulnerable ps_checkout module, this vulnerability presents a severe risk. Account takeover can lead to unauthorized access to customer accounts, exposing sensitive personal and payment information, which violates GDPR and other data protection regulations. Attackers could manipulate orders, conduct fraudulent transactions, or steal customer data, damaging brand reputation and causing financial losses. The lack of user interaction and authentication requirements makes exploitation straightforward, increasing the likelihood of attacks. Given the widespread use of PrestaShop in Europe, particularly among small and medium-sized enterprises, the impact could be broad. Additionally, compromised accounts could be leveraged for further attacks or phishing campaigns targeting European customers. The critical severity and ease of exploitation necessitate urgent remediation to avoid regulatory penalties and operational disruption.
Mitigation Recommendations
The primary mitigation is to upgrade the ps_checkout module to version 4.4.1 or later, or 5.0.5 or later, where the vulnerability is patched. Organizations should audit their PrestaShop installations to identify affected versions and prioritize patching. Since no workarounds exist, temporary measures such as disabling the Express Checkout feature could reduce exposure but may impact user experience. Implementing additional monitoring for unusual login activity or account behavior can help detect exploitation attempts. Enforcing multi-factor authentication (MFA) at the application or payment gateway level may provide an additional security layer, although it may not fully prevent silent logins caused by this vulnerability. Regularly reviewing access logs and integrating threat intelligence feeds for emerging exploit indicators is recommended. Finally, organizations should notify customers about potential risks and encourage vigilance against phishing or suspicious activity.
Affected Countries
France, Germany, United Kingdom, Italy, Spain, Netherlands, Belgium, Poland, Sweden, Austria
CVE-2025-61922: CWE-287: Improper Authentication in PrestaShopCorp ps_checkout
Description
PrestaShop Checkout is the PrestaShop official payment module in partnership with PayPal. Starting in version 1.3.0 and prior to versions 4.4.1 and 5.0.5, missing validation on the Express Checkout feature allows silent login, enabling account takeover via email. The vulnerability is fixed in versions 4.4.1 and 5.0.5. No known workarounds exist.
AI-Powered Analysis
Technical Analysis
CVE-2025-61922 is a critical security vulnerability classified under CWE-287 (Improper Authentication) found in the PrestaShopCorp ps_checkout module, which is the official payment module integrated with PayPal. The vulnerability exists in versions starting from 1.3.0 up to but excluding 4.4.1, and from 5.0.0 up to but excluding 5.0.5. The root cause is a missing validation step in the Express Checkout feature, which allows an attacker to bypass authentication controls and silently log into user accounts using only their email addresses. This silent login effectively enables account takeover without requiring user interaction, credentials, or elevated privileges. The vulnerability has a CVSS v3.1 score of 9.1, indicating critical severity, with an attack vector of network (remote), no required privileges, no user interaction, and high impact on confidentiality and integrity, but no impact on availability. The vulnerability was publicly disclosed on October 16, 2025, and no known exploits have been observed in the wild to date. The issue is resolved in versions 4.4.1 and 5.0.5 of the ps_checkout module. Due to the lack of workarounds, affected organizations must upgrade promptly to mitigate risk. The vulnerability poses a significant threat to e-commerce platforms using PrestaShop, potentially allowing attackers to hijack user accounts, manipulate orders, or commit fraud.
Potential Impact
For European organizations, especially those operating e-commerce platforms using PrestaShop with the vulnerable ps_checkout module, this vulnerability presents a severe risk. Account takeover can lead to unauthorized access to customer accounts, exposing sensitive personal and payment information, which violates GDPR and other data protection regulations. Attackers could manipulate orders, conduct fraudulent transactions, or steal customer data, damaging brand reputation and causing financial losses. The lack of user interaction and authentication requirements makes exploitation straightforward, increasing the likelihood of attacks. Given the widespread use of PrestaShop in Europe, particularly among small and medium-sized enterprises, the impact could be broad. Additionally, compromised accounts could be leveraged for further attacks or phishing campaigns targeting European customers. The critical severity and ease of exploitation necessitate urgent remediation to avoid regulatory penalties and operational disruption.
Mitigation Recommendations
The primary mitigation is to upgrade the ps_checkout module to version 4.4.1 or later, or 5.0.5 or later, where the vulnerability is patched. Organizations should audit their PrestaShop installations to identify affected versions and prioritize patching. Since no workarounds exist, temporary measures such as disabling the Express Checkout feature could reduce exposure but may impact user experience. Implementing additional monitoring for unusual login activity or account behavior can help detect exploitation attempts. Enforcing multi-factor authentication (MFA) at the application or payment gateway level may provide an additional security layer, although it may not fully prevent silent logins caused by this vulnerability. Regularly reviewing access logs and integrating threat intelligence feeds for emerging exploit indicators is recommended. Finally, organizations should notify customers about potential risks and encourage vigilance against phishing or suspicious activity.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-10-03T22:21:59.615Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68f12ee39f8a5dbaeaee601e
Added to database: 10/16/2025, 5:44:03 PM
Last enriched: 10/24/2025, 12:49:23 AM
Last updated: 12/4/2025, 1:27:28 PM
Views: 198
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11222: na in LINE Corporation Central Dogma
MediumCVE-2025-14010: Vulnerability in Red Hat Red Hat Ceph Storage 5
MediumCVE-2025-12826: CWE-862 Missing Authorization in webdevstudios Custom Post Type UI
MediumCVE-2025-12782: CWE-862 Missing Authorization in beaverbuilder Beaver Builder Page Builder – Drag and Drop Website Builder
MediumCVE-2025-13513: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in codejunkie Clik stats
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.