EUVD-2026-16441

| CVE-2026-33673 HIGH
2026-03-25 https://github.com/PrestaShop/PrestaShop
7.6
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
High
Privileges Required
High
User Interaction
Required
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

4
Patch Released
Mar 31, 2026 - 21:13 nvd
Patch available
Analysis Generated
Mar 25, 2026 - 19:47 vuln.today
EUVD ID Assigned
Mar 25, 2026 - 19:47 euvd
EUVD-2026-16441
CVE Published
Mar 25, 2026 - 19:41 nvd
HIGH 7.6

Description

### Impact Multiple stored Cross-Site Scripting (stored XSS) vulnerabilities in the BO: an attacker who can inject data into the database, via limited back-office access or a previously existing vulnerability, can exploit unprotected variables in back-office templates. ### Patches Patched on 8.2.5 and 9.1.0 ### Workarounds None ### References None

Analysis

PrestaShop contains multiple stored Cross-Site Scripting (XSS) vulnerabilities in the back-office (BO) administration panel. An attacker with limited back-office access or who has exploited a separate vulnerability to inject data into the database can exploit unprotected template variables to execute arbitrary JavaScript in administrators' browsers. …

Sign in for full analysis, threat intelligence, and remediation guidance.

Remediation

Within 24 hours: Inventory all PrestaShop instances and document current versions; restrict back-office access to essential personnel only and audit active administrative accounts for unauthorized access. Within 7 days: Implement network segmentation to isolate back-office administration panels; enable enhanced logging and monitoring for suspicious JavaScript execution and administrative actions; conduct user awareness training on phishing and malicious links. …

Sign in for detailed remediation steps.

Priority Score

38
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +38
POC: 0

Share

EUVD-2026-16441 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy