<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>PrestaShop (&lt; 8.2.6) — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/prestashop--8.2.6/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 09 May 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/prestashop--8.2.6/feed.xml" rel="self" type="application/rss+xml"/><item><title>PrestaShop Stored XSS in Customer Service View Allows Back-Office Takeover</title><link>https://feed.craftedsignal.io/briefs/2026-05-prestashop-xss/</link><pubDate>Sat, 09 May 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-prestashop-xss/</guid><description>A stored cross-site scripting (XSS) vulnerability exists in PrestaShop's back-office customer service view, where an unauthenticated attacker can submit a malicious email address via the Contact Us form, leading to session hijacking and full back-office takeover when an employee opens the affected customer thread; patched in PrestaShop 8.2.6 and 9.1.1.</description><content:encoded><![CDATA[<p>A critical stored cross-site scripting (XSS) vulnerability, identified as CVE-2026-44212, affects the Customer Service view of PrestaShop versions prior to 8.2.6 and between 9.0.0 and 9.1.1. This flaw allows an unauthenticated attacker to inject malicious JavaScript code into the system by submitting a crafted email address through the public Contact Us form. The injected payload is then stored within the PrestaShop database. When a back-office employee accesses the affected customer thread through the back-office interface, the stored XSS payload is executed, potentially leading to session hijacking and complete compromise of the PrestaShop back-office environment. This vulnerability was reported by Savio at Doyensec in collaboration with Anthropic Research.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker crafts a malicious email address containing an XSS payload.</li>
<li>The attacker submits the crafted email address through the public Contact Us form on the PrestaShop website.</li>
<li>The PrestaShop application stores the attacker-supplied email address and the associated XSS payload in the database, specifically within the customer service messaging system.</li>
<li>A back-office employee accesses the customer service section of the PrestaShop administration panel.</li>
<li>The employee opens the customer thread associated with the malicious email address.</li>
<li>The PrestaShop application retrieves the stored email address from the database and renders it in the back-office interface.</li>
<li>The stored XSS payload within the email address is executed by the employee&rsquo;s web browser, due to the lack of proper sanitization and output encoding.</li>
<li>The attacker gains control of the employee&rsquo;s session, potentially allowing them to perform administrative actions, access sensitive data, or further compromise the PrestaShop installation.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this stored XSS vulnerability allows an attacker to hijack the session of a PrestaShop back-office employee. This can lead to full control over the PrestaShop installation, including access to sensitive customer data, modification of store settings, installation of malicious modules, and ultimately, complete compromise of the e-commerce platform. Given the critical nature of the back-office, this poses a significant risk to the confidentiality, integrity, and availability of the PrestaShop store. Patches have been released in PrestaShop versions 8.2.6 and 9.1.1 to address this issue.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade PrestaShop installations to version 8.2.6 or 9.1.1 or later to remediate CVE-2026-44212.</li>
<li>Deploy the Sigma rule &ldquo;Detect PrestaShop Stored XSS via Contact Form&rdquo; to identify attempts to inject malicious code via the contact form.</li>
<li>Investigate any alerts triggered by the &ldquo;Detect PrestaShop Stored XSS via Contact Form&rdquo; Sigma rule, focusing on unusual characters in email addresses submitted via the contact form.</li>
<li>Implement robust input validation and output encoding mechanisms within the PrestaShop application to prevent XSS vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>prestashop</category><category>xss</category><category>stored-xss</category><category>cve-2026-44212</category></item></channel></rss>