4.9
CVSSv2

CVE-2020-5250

Published: 05/03/2020 Updated: 05/03/2020
CVSS v2 Base Score: 4.9 | Impact Score: 4.9 | Exploitability Score: 6.8
CVSS v3 Base Score: 6.3 | Impact Score: 4.2 | Exploitability Score: 2.1
VMScore: 436
Vector: AV:N/AC:M/Au:S/C:P/I:P/A:N

Vulnerability Summary

In PrestaShop before version 1.7.6.4, when a customer edits their address, they can freely change the id_address in the form, and thus steal someone else's address. It is the same with CustomerForm, you are able to change the id_customer and change all information of all accounts. The problem is patched in version 1.7.6.4.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

prestashop prestashop

Github Repositories

Labelgrup Fixer for CVE-2020-5250 vulnerability

LabelGrup Networks, official PrestaShop Partner Module for PS 17X to fix CVE-2020-5250 vulnerability (WIP) Check: cvemitreorg/cgi-bin/cvenamecgi?name=CVE-2020-5250 githubcom/PrestaShop/PrestaShop/security/advisories/GHSA-mhfc-6rhg-fxp3 Visit our website: wwwlabelgrupcom