CVE-2023-30838

Source
https://cve.org/CVERecord?id=CVE-2023-30838
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-30838.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-30838
Aliases
Published
2023-04-25T18:22:54.521Z
Modified
2026-04-27T04:06:03.132247Z
Severity
  • 8.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H CVSS Calculator
Summary
PrestaShop vulnerable to possible XSS injection through Validate::isCleanHTML method
Details

PrestaShop is an Open Source e-commerce web application. Prior to versions 8.0.4 and 1.7.8.9, the ValidateCore::isCleanHTML() method of Prestashop misses hijackable events which can lead to cross-site scripting (XSS) injection, allowed by the presence of pre-setup @keyframes methods. This XSS, which hijacks HTML attributes, can be triggered without any interaction by the visitor/administrator, which makes it as dangerous as a trivial XSS attack. Contrary to other attacks which target HTML attributes and are triggered without user interaction (such as onload / onerror which suffer from a very limited scope), this one can hijack every HTML element, which increases the danger due to a complete HTML elements scope. Versions 8.0.4 and 1.7.8.9 contain a fix for this issue.

Database specific
{
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
        "CWE-79"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/30xxx/CVE-2023-30838.json"
}
References

Affected packages

Git / github.com/prestashop/prestashop

Affected ranges

Type
GIT
Repo
https://github.com/prestashop/prestashop
Events
Database specific
{
    "extracted_events": [
        {
            "introduced": "0"
        },
        {
            "fixed": "1.7.8.9"
        },
        {
            "introduced": "8.0.0"
        },
        {
            "fixed": "8.0.4"
        }
    ],
    "cpe": "cpe:2.3:a:prestashop:prestashop:*:*:*:*:*:*:*:*",
    "source": [
        "CPE_FIELD",
        "REFERENCES"
    ]
}

Affected versions

1.*
1.6.0.1
1.6.0.3
1.6.1.0
1.7.0.0-beta.1.0
1.7.0.0-beta.2.0
1.7.0.0-beta.4.0
1.7.0.0-rc.0.0
1.7.8.3
8.*
8.0.0-beta.1
8.0.2

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-30838.json"