![Advisory Published](https://public.secalerts.co/assets/images/icon-advisory-published.svg)
22/1/2025
![Advisory Published](https://public.secalerts.co/assets/images/icon-advisory-published.svg)
22/1/2025
![Updated](https://public.secalerts.co/assets/images/icon-updated.svg)
22/1/2025
CVE-2025-24027: ps_contactinfo has potential XSS due to usage of the nofilter tag in template
First published: Wed Jan 22 2025(Updated: )
### Impact
This can not be exploited in a fresh install of PrestaShop, only shops made vulnerable by third party modules are concerned.
For example, if your shop has a third party module vulnerable to SQL injections, then ps_contactinfo might execute a stored XSS in FO.
### Patches
The long term fix is to have all your modules maintained and updated.
The fix on ps_contactinfo will keep formatted addresses from displaying an xss stored in the database.
### Workarounds
none
### References
none
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|
composer/prestashop/ps_contactinfo | <=3.3.2 | 3.3.3 |
PrestaShop ps_contactinfo | <=3.3.2 | |
Never miss a vulnerability like this again
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
Frequently Asked Questions
What is the severity of CVE-2025-24027?
The severity of CVE-2025-24027 is considered high due to the potential for stored XSS attacks facilitated through vulnerable third-party modules.
How do I fix CVE-2025-24027?
To fix CVE-2025-24027, upgrade the 'prestashop/ps_contactinfo' module to version 3.3.3 or later.
Who is affected by CVE-2025-24027?
CVE-2025-24027 affects PrestaShop installations that have third-party modules susceptible to SQL injection.
Can CVE-2025-24027 be exploited on a fresh installation of PrestaShop?
No, CVE-2025-24027 cannot be exploited in a fresh installation of PrestaShop.
What type of vulnerabilities are involved in CVE-2025-24027?
CVE-2025-24027 involves stored XSS vulnerabilities that can be triggered by compromised input from vulnerable third-party modules.
- collector/mitre-cve
- source/MITRE
- agent/weakness
- agent/title
- agent/type
- agent/first-publish-date
- collector/nvd-api
- source/NVD
- agent/severity
- collector/github-advisory-latest
- source/GitHub
- alias/GHSA-35pq-7pv2-2rfw
- alias/CVE-2025-24027
- agent/software-canonical-lookup
- agent/last-modified-date
- agent/references
- agent/description
- agent/softwarecombine
- agent/event
- collector/nvd-cve
- agent/author
- agent/source
- collector/epss-latest
- source/FIRST
- agent/epss
- agent/tags
- agent/guess-ai
- agent/software-canonical-lookup-request
- package-manager/composer
- vendor/prestashop
- canonical/prestashop ps_contactinfo
Contact
SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.coBy using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203