Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

prestashop

About This Vendor

prestashop is a technology vendor producing software and infrastructure products. As a software provider, prestashop's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of prestashop's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 129 known vulnerabilities from prestashop. This includes 29 critical-severity issues and 25 high-severity issues that represent significant risk. These vulnerabilities affect 39 distinct products across prestashop's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 2008 through 2026, indicating decades of continuous security attention and research. Organizations deploying prestashop products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2008-5791 2008-12-31 2026-04-23 - 10.0 Likely
CVE-2008-6503 2009-03-20 2026-04-23 - 4.3 Likely
CVE-2011-3796 2011-09-24 2025-04-11 - 5.0 Likely
CVE-2011-4544 2011-12-01 2025-04-11 - 4.3 Likely
CVE-2011-4545 2011-12-02 2025-04-11 - 5.0 Likely
CVE-2012-5799 2012-11-04 2025-04-11 - 5.8 Likely
CVE-2012-5800 2012-11-04 2025-04-11 - 5.8 Likely
CVE-2012-5801 2012-11-04 2025-04-11 - 5.8 Likely
CVE-2012-6641 2014-04-07 2025-04-12 - 4.3 Likely
CVE-2015-1175 2015-01-22 2025-04-12 - 4.3 Likely
CVE-2018-5681 2018-01-13 2024-11-21 5.4 3.5 Unknown
CVE-2018-5682 2018-01-13 2024-11-21 5.3 5.0 Likely
CVE-2018-7491 2018-02-26 2024-11-21 7.5 5.0 Likely
CVE-2018-8823 2018-03-28 2024-11-21 9.8 7.5 Likely
CVE-2018-10942 2018-05-10 2024-11-21 9.8 7.5 Likely
CVE-2018-8824 2018-05-10 2024-11-21 9.8 7.5 Likely
CVE-2018-13784 2018-07-09 2024-11-21 9.1 6.4 Likely
CVE-2018-19124 2018-11-09 2024-11-21 7.5 5.0 Likely
CVE-2018-19125 2018-11-09 2024-11-21 7.5 6.4 Likely
CVE-2018-19126 2018-11-09 2024-11-21 9.8 7.5 Likely
CVE-2018-19355 2018-11-19 2024-11-21 9.8 7.5 Likely
CVE-2018-20717 2019-01-15 2024-11-21 8.8 6.5 Likely
CVE-2019-11876 2019-05-24 2024-11-21 6.1 4.3 Likely
CVE-2019-13461 2019-07-09 2024-11-21 7.5 5.0 Likely
CVE-2019-19594 2019-12-05 2024-11-21 9.8 7.5 Likely
CVE-2019-19595 2019-12-05 2024-11-21 9.8 7.5 Likely
CVE-2020-6632 2020-01-09 2024-11-21 6.1 4.3 Likely
CVE-2013-6358 2020-01-23 2024-11-21 8.8 9.0 Likely
CVE-2012-2517 2020-02-11 2024-11-21 6.1 4.3 Likely
CVE-2013-4791 2020-02-14 2024-11-21 5.4 3.5 Unknown
CVE-2013-4792 2020-02-14 2024-11-21 5.5 3.5 Unknown
CVE-2013-6295 2020-02-18 2024-11-21 9.8 7.5 Likely
CVE-2020-5250 2020-03-05 2024-11-21 7.6 4.9 Unknown
CVE-2020-5277 2020-03-25 2024-11-21 4.1 3.5 Unknown
CVE-2020-5266 2020-04-16 2024-11-21 4.4 3.5 Unknown
CVE-2020-5273 2020-04-16 2024-11-21 4.1 3.5 Unknown
CVE-2020-5294 2020-04-16 2024-11-21 4.1 3.5 Unknown
CVE-2020-5264 2020-04-20 2024-11-21 4.4 4.3 Likely
CVE-2020-5265 2020-04-20 2024-11-21 4.4 4.3 Likely
CVE-2020-5269 2020-04-20 2024-11-21 4.1 4.3 Likely
CVE-2020-5270 2020-04-20 2024-11-21 4.1 5.8 Likely
CVE-2020-5271 2020-04-20 2024-11-21 4.1 4.3 Likely
CVE-2020-5272 2020-04-20 2024-11-21 4.1 4.3 Likely
CVE-2020-5276 2020-04-20 2024-11-21 4.1 4.3 Likely
CVE-2020-5278 2020-04-20 2024-11-21 4.1 4.3 Likely
CVE-2020-5279 2020-04-20 2024-11-21 4.1 6.4 Likely
CVE-2020-5285 2020-04-20 2024-11-21 4.1 4.3 Likely
CVE-2020-5286 2020-04-20 2024-11-21 4.1 4.3 Likely
CVE-2020-5287 2020-04-20 2024-11-21 4.1 6.4 Likely
CVE-2020-5288 2020-04-20 2024-11-21 4.1 6.4 Likely
CVE-2020-5293 2020-04-20 2024-11-21 6.5 6.4 Likely
CVE-2020-12120 2020-04-27 2024-11-21 7.5 5.0 Likely
CVE-2020-11074 2020-07-02 2024-11-21 5.4 3.5 Unknown
CVE-2020-15079 2020-07-02 2024-11-21 6.4 5.5 Likely
CVE-2020-15080 2020-07-02 2024-11-21 5.3 5.0 Likely
CVE-2020-15081 2020-07-02 2024-11-21 5.3 5.0 Likely
CVE-2020-15082 2020-07-02 2024-11-21 7.1 7.5 Likely
CVE-2020-15083 2020-07-02 2024-11-21 4.7 4.3 Likely
CVE-2020-4074 2020-07-02 2024-11-21 8.9 10.0 Likely
CVE-2020-15102 2020-07-21 2024-11-21 6.5 4.0 Likely
CVE-2020-15178 2020-09-15 2024-11-21 8.0 4.3 Likely
CVE-2020-15161 2020-09-24 2024-11-21 5.4 4.3 Likely
CVE-2020-15160 2020-09-24 2024-11-21 9.8 7.5 Likely
CVE-2020-15162 2020-09-24 2024-11-21 5.4 3.5 Unknown
CVE-2020-26224 2020-11-16 2024-11-21 7.5 5.0 Likely
CVE-2020-26225 2020-11-16 2024-11-21 8.7 4.3 Likely
CVE-2020-26248 2020-12-03 2024-11-21 6.8 6.4 Likely
CVE-2021-3110 2021-01-20 2024-11-21 9.8 7.5 Likely
CVE-2021-21302 2021-02-26 2024-11-21 6.8 6.5 Likely
CVE-2021-21308 2021-02-26 2024-11-21 6.1 6.4 Likely
CVE-2021-21398 2021-03-30 2024-11-21 5.4 3.5 Unknown
CVE-2021-21418 2021-03-31 2024-11-21 4.6 3.5 Unknown
CVE-2021-43789 2021-12-07 2024-11-21 7.5 7.5 Likely
CVE-2012-20001 2021-12-21 2024-11-21 6.1 4.3 Likely
CVE-2022-21686 2022-01-26 2024-11-21 9.0 7.5 Likely
CVE-2022-31101 2022-06-27 2024-11-21 8.1 6.5 Likely
CVE-2020-21967 2022-07-13 2024-11-21 4.8 3.5 Unknown
CVE-2022-31181 2022-08-01 2024-11-21 9.8 - -
CVE-2022-35933 2022-09-02 2024-11-21 6.1 - -
CVE-2022-46158 2022-12-08 2024-11-21 5.3 - -
CVE-2023-24763 2023-03-06 2025-03-07 8.8 - -
CVE-2023-25170 2023-03-13 2024-11-21 5.0 - -
CVE-2023-25207 2023-03-13 2025-03-03 9.8 - -
CVE-2023-25206 2023-03-14 2024-11-21 8.8 - -
CVE-2023-27569 2023-03-21 2025-02-26 9.8 - -
CVE-2023-27570 2023-03-21 2025-02-26 9.8 - -
CVE-2023-30545 2023-04-25 2024-11-21 7.7 - -
CVE-2023-30838 2023-04-25 2024-11-21 8.5 - -
CVE-2023-30839 2023-04-25 2024-11-21 9.9 - -
CVE-2023-30282 2023-05-04 2025-01-29 7.5 - -
CVE-2023-30194 2023-05-10 2025-01-27 9.8 - -
CVE-2023-30192 2023-05-12 2025-01-27 9.8 - -
CVE-2023-30149 2023-06-02 2025-01-31 9.8 - -
CVE-2023-30153 2023-07-18 2024-11-21 9.8 - -
CVE-2023-33777 2023-07-25 2024-11-21 5.3 - -
CVE-2023-39524 2023-08-07 2024-11-21 6.7 - -
CVE-2023-39525 2023-08-07 2024-11-21 6.5 - -
CVE-2023-39526 2023-08-07 2024-11-21 9.1 - -
CVE-2023-39527 2023-08-07 2024-11-21 8.3 - -
CVE-2023-39528 2023-08-07 2024-11-21 6.8 - -
CVE-2023-39529 2023-08-07 2024-11-21 6.7 - -
CVE-2023-39530 2023-08-07 2024-11-21 6.5 - -
CVE-2022-45447 2023-09-20 2024-11-21 6.5 - -
CVE-2022-45448 2023-09-20 2024-11-21 3.5 - -
CVE-2023-43663 2023-09-28 2024-11-21 6.3 - -
CVE-2023-43664 2023-09-28 2024-11-21 4.3 - -
CVE-2023-36263 2023-10-31 2024-11-21 9.8 - -
CVE-2023-47109 2023-11-08 2024-11-21 5.5 - -
CVE-2023-47110 2023-11-09 2024-11-21 9.1 - -
CVE-2024-21627 2024-01-02 2024-11-21 8.1 - -
CVE-2024-21628 2024-01-02 2024-11-21 5.4 - -
CVE-2023-48926 2024-01-16 2025-06-02 5.3 - -
CVE-2024-26129 2024-02-19 2025-01-17 5.8 - -
CVE-2024-25843 2024-02-27 2025-05-15 9.8 - -
CVE-2024-28392 2024-03-20 2025-09-18 9.8 - -
CVE-2024-34716 2024-05-14 2025-01-21 9.6 - -
CVE-2024-34717 2024-05-14 2025-01-21 5.3 - -
CVE-2024-36684 2024-06-19 2024-11-21 9.8 - -
CVE-2024-41651 2024-08-12 2024-10-09 8.1 - -
CVE-2024-36626 2024-11-29 2025-09-15 5.3 - -
CVE-2025-25691 2025-07-30 2025-08-06 6.5 - -
CVE-2025-25692 2025-07-30 2025-08-06 6.5 - -
CVE-2025-51586 2025-09-08 2025-09-12 3.7 - -
CVE-2025-61922 2025-10-16 2025-12-29 9.1 - -
CVE-2025-61923 2025-10-16 2025-12-29 4.1 - -
CVE-2025-61924 2025-10-16 2025-12-29 3.8 - -
CVE-2026-25597 2026-02-06 2026-02-19 5.3 - -
CVE-2026-33673 2026-03-26 2026-04-01 7.6 - -
CVE-2026-33674 2026-03-26 2026-04-01 2.0 - -

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for prestashop by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with prestashop's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.