[CVE-2024-28387] Exposure of Private Personal Information to an Unauthorized Actor in Axonaut module for PrestaShop

PrestaShop Security Advisory

In the module “Axonaut” (axonaut) up to version 3.1.23 from Axonaut for PrestaShop, a guest can download personal information without restriction.


  • CVE ID: CVE-2024-28387
  • Published at: 2024-03-19
  • Platform: PrestaShop
  • Product: axonaut
  • Impacted release: <= 3.1.23 (3.2.0 fixed the vulnerability)
  • Product author: Axonaut
  • Weakness: CWE-359
  • Severity: medium (7.5), GDPR violation


Due to a lack of permissions control, a guest can access log file from the module which can lead to leak of personal information from ps_customer/ps_address tables such as email / full postal address

CVSS base metrics

  • Attack vector: network
  • Attack complexity: low
  • Privilege required: none
  • User interaction: none
  • Scope: unchanged
  • Confidentiality: high
  • Integrity: none
  • Availability: none

Vector string: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Possible malicious usage

  • Steal personal data

Other recommendations

  • It’s recommended to upgrade to the latest version of the module axonaut.
  • You should restrict access to this URI pattern : modules/axonaut/ to a given whitelist


2023-07-18Issue discovered during a code review by TouchWeb.fr
2023-07-18Contact Author to confirm version scope
2023-07-20Author confirms version scope and provide a patch
2024-03-11Received CVE ID
2024-03-19Publish this security advisory


Leave a Reply

Your email address will not be published. Required fields are marked *