Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61923: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in PrestaShopCorp ps_checkout

0
Medium
VulnerabilityCVE-2025-61923cvecve-2025-61923cwe-22
Published: Thu Oct 16 2025 (10/16/2025, 17:31:07 UTC)
Source: CVE Database V5
Vendor/Project: PrestaShopCorp
Product: ps_checkout

Description

PrestaShop Checkout is the PrestaShop official payment module in partnership with PayPal. In versions prior to 4.4.1 and 5.0.5, the backoffice is missing validation on input resulting in a directory traversal and arbitrary file disclosure. The vulnerability is fixed in versions 4.4.1 and 5.0.5. No known workarounds exist.

AI-Powered Analysis

AILast updated: 10/16/2025, 17:59:43 UTC

Technical Analysis

CVE-2025-61923 is a path traversal vulnerability classified under CWE-22, found in the PrestaShopCorp ps_checkout module, which is the official payment integration for PrestaShop in partnership with PayPal. The vulnerability exists in versions prior to 4.4.1 and between 5.0.0 and 5.0.5 due to insufficient validation of input parameters in the backoffice interface. This lack of proper input sanitization allows an authenticated user with high privileges to manipulate file path parameters to access files outside the intended directory scope. The vulnerability enables arbitrary file disclosure, potentially exposing sensitive configuration files, credentials, or other confidential data stored on the server. The CVSS v3.1 score of 4.1 reflects a medium severity, with network attack vector, low attack complexity, and requiring privileges but no user interaction. The vulnerability does not impact integrity or availability but compromises confidentiality. No known exploits have been reported in the wild, and no workarounds exist aside from patching. The issue is resolved in versions 4.4.1 and 5.0.5 by implementing proper input validation and path restrictions. Organizations using affected versions should upgrade promptly to mitigate risk.

Potential Impact

For European organizations, the primary impact of CVE-2025-61923 is the potential unauthorized disclosure of sensitive files from the server hosting the PrestaShopCheckout module. This could include payment configurations, API keys, customer data, or internal system files, leading to confidentiality breaches. Such data exposure could facilitate further attacks, including fraud or targeted phishing. Although the vulnerability requires authenticated access with high privileges, insider threats or compromised administrative accounts could exploit it. The impact is particularly significant for e-commerce businesses relying on PrestaShop, as payment data confidentiality is critical for compliance with GDPR and PCI-DSS regulations. Failure to address this vulnerability could result in regulatory penalties, reputational damage, and financial losses. The lack of known exploits reduces immediate risk, but the public disclosure increases the likelihood of future exploitation attempts.

Mitigation Recommendations

The definitive mitigation for CVE-2025-61923 is to upgrade the ps_checkout module to version 4.4.1 or 5.0.5 or later, where the vulnerability has been fixed. Organizations should verify their PrestaShopCheckout version and apply updates promptly. Additionally, restrict backoffice access strictly to trusted administrators using strong authentication mechanisms such as multi-factor authentication (MFA). Implement network segmentation and firewall rules to limit access to the backoffice interface from trusted IP addresses only. Regularly audit user privileges to ensure that only necessary personnel have high-level access. Monitor logs for unusual file access patterns that could indicate exploitation attempts. Since no workarounds exist, patching combined with access controls is essential. Finally, ensure backups of critical data are maintained securely to recover from any potential data compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-10-03T22:21:59.615Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f12ee39f8a5dbaeaee6012

Added to database: 10/16/2025, 5:44:03 PM

Last enriched: 10/16/2025, 5:59:43 PM

Last updated: 10/19/2025, 4:14:17 AM

Views: 51

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats