CVE-2025-24027

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-24027
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-24027.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-24027
Aliases
Published
2025-01-22T14:26:42.830Z
Modified
2025-12-02T08:01:09.588865Z
Severity
  • 6.2 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:L/A:H CVSS Calculator
Summary
ps_contactinfo has potential XSS due to usage of the nofilter tag in template
Details

pscontactinfo, a PrestaShop module for displaying store contact information, has a cross-site scripting (XSS) vulnerability in versions up to and including 3.3.2. This can not be exploited in a fresh install of PrestaShop, only shops made vulnerable by third party modules are concerned. For example, if the shop has a third party module vulnerable to SQL injections, then pscontactinfo might execute a stored cross-site scripting in formatting objects. Commit d60f9a5634b4fc2d3a8831fb08fe2e1f23cbfa39 keeps formatted addresses from displaying a XSS stored in the database, and the fix is expected to be available in version 3.3.3. No workarounds are available aside from applying the fix and keeping all modules maintained and update.

Database specific
{
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
        "CWE-79"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/24xxx/CVE-2025-24027.json"
}
References

Affected packages

Git / github.com/prestashop/ps_contactinfo

Affected ranges

Type
GIT
Repo
https://github.com/prestashop/ps_contactinfo
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v2.*

v2.0.1

v3.*

v3.0.0
v3.1.0
v3.2.0
v3.3.0
v3.3.1
v3.3.2