CVE-2022-31181

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-31181
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-31181.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-31181
Aliases
Published
2022-08-01T19:30:16Z
Modified
2025-12-04T10:25:14.621453Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Remote code execution in prestashop
Details

PrestaShop is an Open Source e-commerce platform. In versions from 1.6.0.10 and before 1.7.8.7 PrestaShop is subject to an SQL injection vulnerability which can be chained to call PHP's Eval function on attacker input. The problem is fixed in version 1.7.8.7. Users are advised to upgrade. Users unable to upgrade may delete the MySQL Smarty cache feature.

Database specific
{
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/31xxx/CVE-2022-31181.json",
    "cwe_ids": [
        "CWE-74",
        "CWE-89"
    ]
}
References

Affected packages

Git / github.com/prestashop/prestashop

Affected ranges

Type
GIT
Repo
https://github.com/prestashop/prestashop
Events

Database specific

source

"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-31181.json"