CVE-2023-39524: PrestaShop boolean SQL injection
6.7
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.52918%
CWE
Published
8/9/2023
Updated
11/6/2023
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| prestashop/prestashop | composer | <= 8.1.0 | 8.1.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The commit diff shows the vulnerability was patched by adding pSQL() sanitization to $searchPhrase in ProductRepository.php's getSearchQueryBuilder method. This function directly processes user-controlled input for SQL query construction without proper escaping in vulnerable versions, making it the clear injection point. The patch confirms the vulnerability stemmed from missing input sanitization at this location.