{"id":"CVE-2023-39525","summary":"PrestaShop vulnerable to path traversal","details":"PrestaShop is an open source e-commerce web application. Prior to version 8.1.1, in the back office, files can be compromised using path traversal by replaying the import file deletion query with a specified file path that uses the traversal path. Version 8.1.1 contains a patch for this issue. There are no known workarounds.","aliases":["BIT-prestashop-2023-39525","GHSA-m9r4-3fg7-pqm2"],"modified":"2026-04-10T04:59:30.418974Z","published":"2023-08-07T20:23:53.884Z","database_specific":{"cna_assigner":"GitHub_M","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/39xxx/CVE-2023-39525.json","cwe_ids":["CWE-22"]},"references":[{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/39xxx/CVE-2023-39525.json"},{"type":"ADVISORY","url":"https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-m9r4-3fg7-pqm2"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-39525"},{"type":"FIX","url":"https://github.com/PrestaShop/PrestaShop/commit/c7c9a5110421bb2856f4d312ecce192d079b5ec7"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/prestashop/prestashop","events":[{"introduced":"0"},{"fixed":"f7749a47681ff2b1d52c5cabcfe99933fa1db548"}]}],"versions":["1.6.0.1","1.6.0.3","1.6.1.0","1.7.0.0-beta.1.0","1.7.0.0-beta.2.0","1.7.0.0-beta.4.0","1.7.0.0-rc.0.0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-39525.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H"}]}