Blog navigation

Blog Rss rss_feed

PrestaShop Vulnerability: CVE-2025-51586 — User Enumeration via AdminLogin

PrestaShop Vulnerability: CVE-2025-51586 — User Enumeration via AdminLogin

In PrestaShop versions 1.7 — 8.2.2, the Back Office password reset page could reveal a hidden field containing an administrator’s email address even when the reset token was invalid. In practice: if someone knows the admin URL, they can iterate id_employee values and obtain real admin e‑mail addresses. Fixed in 8.2.3.

A list of real admin e‑mail addresses is a useful starting point for phishing, targeted mailings, and attempts to take over accounts. This is not a full compromise, but it gives an attacker actionable information to use next.

What to do right now

  • Upgrade your store to PrestaShop 8.2.3 or higher. This is the definitive fix.

  • If you cannot upgrade immediately — restrict external access to the admin area: use an IP whitelist, VPN, or web‑server level authentication. Make the admin area available only from trusted source addresses.

  • Change the admin path if it’s a default one (/admin, /admin123, etc.). It’s a simple step that makes automated scanning harder.

How to tell if your store is at risk

  • PrestaShop version is below 8.2.3 — you are vulnerable.

  • The admin area is accessible at an obvious path like /admin — consider restricting and changing it.

  • Server logs show many similar requests to the password reset form — someone may be probing admin emails.

If you run a PrestaShop store — updating to 8.2.3+ is mandatory. In addition, restrict external admin access, enable two‑factor authentication, and monitor logs. These are simple measures that meaningfully protect your store.

More >

Was this blog post helpful to you?

    
👈 Присоединяйтесь к нашему Telegram-каналу!

Будьте в курсе последних новинок и фишек e-commerce: советы, полезные инструменты и эксклюзивные материалы.

No comments at this moment
close

Checkout

close

Favourites