Vulnerability Description
In the module "PireosPay" (pireospay) before version 1.7.10 from 01generator.com for PrestaShop, a guest can perform SQL injection via `PireosPayValidationModuleFrontController::postProcess().`
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| 01Generator | Pireospay | < 1.7.10 |
Related Weaknesses (CWE)
References
- https://security.friendsofpresta.org/modules/2023/10/12/pireospay.htmlExploitPatchThird Party Advisory
- https://security.friendsofpresta.org/modules/2023/10/12/pireospay.htmlExploitPatchThird Party Advisory
FAQ
What is CVE-2023-45375?
CVE-2023-45375 is a vulnerability with a CVSS score of 8.8 (HIGH). In the module "PireosPay" (pireospay) before version 1.7.10 from 01generator.com for PrestaShop, a guest can perform SQL injection via `PireosPayValidationModuleFrontController::postProcess().`
How severe is CVE-2023-45375?
CVE-2023-45375 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-45375?
Check the references section above for vendor advisories and patch information. Affected products include: 01Generator Pireospay.