CVE-2025-51586
PHP vulnerability analysis and mitigation

Overview

CVE-2025-51586 is a security vulnerability discovered in PrestaShop's back office password reset feature. The vulnerability was disclosed on September 4, 2025, affecting PrestaShop versions below 8.2.3. This moderate severity flaw allows unauthenticated attackers to enumerate valid back-office employee email addresses through manipulation of the idemployee and resettoken parameters (PrestaShop Advisory).

Technical details

The vulnerability exists within the selectEventConfig method of PrestaShop's back office authentication system. The issue stems from improper validation of user-supplied strings before using them to construct queries. The vulnerability has been assigned a CVSS v3.1 base score of 4.2 (Moderate) with the vector string CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N. The flaw is classified as CWE-203 (Observable Discrepancy), where the system behaves differently under various circumstances in a way that is observable to unauthorized actors (GitHub Advisory).

Impact

The vulnerability impacts store administrators and employees by exposing their email addresses to potential attackers. This exposure creates risks for merchants, including potential phishing attacks, social engineering attempts, and brute-force attacks targeting admin accounts. The exploitation requires the attacker to have access to the back-office URL (PrestaShop Release).

Mitigation and workarounds

The primary mitigation is to update to PrestaShop version 8.2.3, which contains the security fix. For those unable to update immediately, several temporary workarounds are available: restricting network access to the back office, adding extra HTTP authentication, customizing the back-office URL, implementing rate limiting, monitoring logs for suspicious activities, and enabling 2FA for employee accounts. However, these workarounds should not be considered permanent solutions (PrestaShop Advisory).

Community reactions

The vulnerability was responsibly reported by Maxime Morel-Bailly, with fixes implemented by M0rgan01 and matthieu-rolland. OpenServis and TouchWeb played a crucial role in alerting about ongoing waves of enumeration attempts in the wild (PrestaShop Release).

Additional resources


SourceThis report was generated using AI

Related PHP vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-9824MEDIUM5.9
  • PHPPHP
  • mautic/core
NoYesSep 03, 2025
CVE-2025-9822MEDIUM5.5
  • PHPPHP
  • mautic/core
NoYesSep 03, 2025
CVE-2025-9823MEDIUM4.8
  • PHPPHP
  • mautic/core
NoYesSep 03, 2025
CVE-2025-51586LOW3.7
  • PHPPHP
  • cpe:2.3:a:prestashop:prestashop
NoYesSep 08, 2025
CVE-2025-9821LOW2.7
  • PHPPHP
  • mautic/core
NoYesSep 03, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management