Blog navigation

Blog Rss rss_feed

Critical Vulnerability in AP Page Builder  4.0.0 CVE-2024-6648 Read Any File on the Server⚠️

Critical Vulnerability in AP Page Builder 4.0.0 CVE-2024-6648 Read Any File on the Server⚠️

On May 22, 2025, a critical vulnerability affecting the popular AP Page Builder module for PrestaShop was disclosed on security.friendsofpresta.org. Identified as CVE-2024-6648, the issue scored 8.7 on the CVSS scale, making it a serious risk for thousands of PrestaShop stores.

What’s the vulnerability?

This is an Absolute Path Traversal vulnerability (CWE-36), which allows an attacker to request arbitrary files from the server.

In versions prior to 4.0.0, the module improperly handles a config parameter in Base64 format sent to apajax.php. By manipulating this payload, an unauthenticated attacker can read any file that the PHP process has access to — including sensitive configuration and system files.

How does the attack work?

The attacker sends a crafted GET request to the apajax.php file with a Base64-encoded config parameter. Within this payload, the attacker modifies the product_item_path value to specify a file to read.

Example attack request:

curl -v "https://example.com/modules/appagebuilder/apajax.php?config=eyJvcmRlcl9ieSI6ImlkX3Byb2R1Y3QiLCJuYl9wcm9kdWN0cyI6IjIiLCJ0b3RhbF9wYWdlIjoxLCAicHJvZHVjdF9pdGVtX3BhdGgiOiAiY29uZmlnLnhtbCIsICJjb2x1bW5zIjogMX0%3d&p=1"

Decoded JSON payload:

{ "product_item_path": "/etc/passwd" }

⚠️ Important: Attackers can obfuscate the Base64 string using special characters (e.g., Li4$vLi4-vY#...) to bypass firewalls. PHP’s base64_decode() silently ignores these characters, making detection harder.

Proof of Concept

A working proof of concept was published by n0d0n on GitHub:
👉 github.com/n0d0n/CVE-2024-6648

Who is affected?

  • All PrestaShop stores using AP Page Builder < 4.0.0

  • Over 2,000 themes across various marketplaces include this module

If you use themes by Apollo Theme or marketplaces that bundle Page Builder features, you are likely at risk.

How to protect your store

  1. Update AP Page Builder to version 4.0.0 or higher immediately.

  2. If you use ModSecurity, prefer base64DecodeExt over base64Decode.

  3. Inspect server logs for unusual requests to apajax.php with config parameters.

  4. Review your file permission settings.

  5. Consider using a WAF or security module with detection rules for path traversal.

Timeline

Date Event
2024-07-15 Vulnerability reported to the developer by Incibe
2024-08-16 Developer requested a 1-year disclosure delay
2024-10-16 9-month delay agreed
2025-05-08 Public disclosure and PoC released

If your store uses the AP Page Builder module, this is a must-fix issue. CVE-2024-6648 allows anyone on the internet to access sensitive files, potentially leading to full compromise of your shop.

Check if you have the module by looking for modules/appagebuilder/ in your PrestaShop directory, and update now.

Need help securing your store? Leave a comment or reach out — your store's security is too important to leave to chance.

Was this blog post helpful to you?

    
👈 Присоединяйтесь к нашему Telegram-каналу!

Будьте в курсе последних новинок и фишек e-commerce: советы, полезные инструменты и эксклюзивные материалы.

No comments at this moment
close

Checkout

close

Favourites