Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-0457 | PrestaShop is an open-source e-commerce platform. Prior to versions 8.1.3 and 1.7.8.11, some event attributes are not detected by the `isCleanHTML` method. Some modules using the `isCleanHTML` method could be vulnerable to cross-site scripting. Versions 8.1.3 and 1.7.8.11 contain a patch for this issue. The best workaround is to use the `HTMLPurifier` library to sanitize html input coming from users. The library is already available as a dependency in the PrestaShop project. Beware though that in legacy object models, fields of `HTML` type will call `isCleanHTML`. |
Github GHSA |
GHSA-xgpm-q3mq-46rq | PrestaShop some attribute not escaped in Validate::isCleanHTML method |
Tue, 03 Jun 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-06-03T14:45:21.732Z
Reserved: 2023-12-29T03:00:44.954Z
Link: CVE-2024-21627
Updated: 2024-08-01T22:27:36.164Z
Status : Modified
Published: 2024-01-02T21:15:10.467
Modified: 2024-11-21T08:54:45.337
Link: CVE-2024-21627
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA