CVE-2023-30149
Severity CVSS v4.0:
Pending analysis
Type:
CWE-89
SQL Injection
Publication date:
02/06/2023
Last modified:
31/01/2025
Description
SQL injection vulnerability in the City Autocomplete (cityautocomplete) module from ebewe.net for PrestaShop, prior to version 1.8.12 (for PrestaShop version 1.5/1.6) or prior to 2.0.3 (for PrestaShop version 1.7), allows remote attackers to execute arbitrary SQL commands via the type, input_name. or q parameter in the autocompletion.php front controller.
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:ebewe:city_autocomplete:*:*:*:*:*:prestashop:*:* | 1.8.12 (excluding) | |
| cpe:2.3:a:prestashop:prestashop:1.5.0.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:prestashop:prestashop:1.6.0.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:ebewe:city_autocomplete:*:*:*:*:*:prestashop:*:* | 2.0.3 (excluding) | |
| cpe:2.3:a:prestashop:prestashop:1.7.0.0:-:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://addons.prestashop.com/fr/inscription-processus-de-commande/6097-city-autocomplete.html
- https://friends-of-presta.github.io/security-advisories/module/2023/06/01/cityautocomplete.html
- https://addons.prestashop.com/fr/inscription-processus-de-commande/6097-city-autocomplete.html
- https://friends-of-presta.github.io/security-advisories/module/2023/06/01/cityautocomplete.html



