PrestaShop XSS: Critical Back-Office Takeover via Customer Service View
The National Vulnerability Database has detailed CVE-2026-44212, a critical stored Cross-Site Scripting (XSS) vulnerability affecting PrestaShop, an open-source e-commerce web application. This flaw, present in versions prior to 8.2.6 and 9.1.1, allows an unauthenticated attacker to inject malicious payloads through the public ‘Contact Us’ form. The payload is then stored in the database.
The critical aspect here is the attack vector: when a back-office employee opens the affected customer thread, the malicious script executes. This provides a clear path for session hijacking and, ultimately, a full back-office takeover. Such a compromise grants an attacker extensive control over the e-commerce platform, potentially leading to data theft, payment manipulation, or website defacement. This isn’t theoretical; it’s a direct route to administrative access.
PrestaShop has addressed this vulnerability in versions 8.2.6 and 9.1.1. Given the ease of exploitation and the severe impact, any organization running PrestaShop must prioritize patching. This isn’t a complex chain; it’s a simple, unauthenticated entry point leading to total control. Attackers will certainly be scanning for unpatched instances.
What This Means For You
- If your organization uses PrestaShop, immediately verify your version. If you are running anything prior to 8.2.6 or 9.1.1, you are exposed to a critical XSS vulnerability that can lead to full back-office compromise. Patch to the latest secure versions (8.2.6 or 9.1.1) without delay. Audit your customer service logs for any suspicious contact form submissions from unusual email addresses, especially those containing script-like characters.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
PrestaShop Customer Service XSS - Contact Form Submission - CVE-2026-44212
title: PrestaShop Customer Service XSS - Contact Form Submission - CVE-2026-44212
id: scw-2026-05-14-ai-1
status: experimental
level: critical
description: |
Detects the initial submission of the PrestaShop contact form with a suspicious email parameter, which is the vector for CVE-2026-44212. This vulnerability allows unauthenticated attackers to inject a stored XSS payload via the 'email' field, leading to back-office takeover when an employee views the customer thread.
author: SCW Feed Engine (AI-generated)
date: 2026-05-14
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-44212/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: webserver
detection:
selection:
cs-uri|contains:
- '/contact'
cs-method:
- 'POST'
cs-uri-query|contains:
- 'email='
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-44212 | XSS | PrestaShop versions prior to 8.2.6 and 9.1.1 |
| CVE-2026-44212 | XSS | PrestaShop back-office Customer Service view |
| CVE-2026-44212 | XSS | Public Contact Us form with malicious email address |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 15, 2026 at 00:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.