[CVE-2024-28396] Exposure of Sensitive Information to an Unauthorized Actor in MyPrestaModules – Orders (CSV, Excel) Export PRO module for PrestaShop

PrestaShop Security Advisory

In the module “Orders (CSV, Excel) Export PRO” (ordersexport) up to version 6.0.2 from MyPrestaModules for PrestaShop, a guest can download sensitive information without restriction.


  • CVE ID: CVE-2024-28396
  • Published at: 2024-03-14
  • Platform: PrestaShop
  • Product: ordersexport
  • Impacted release: <= 6.0.2 (6.0.3 fixed the vulnerability)
  • Product author: MyPrestaModules
  • Weakness: CWE-200
  • Severity: medium (7.5), GDPR violation


Due to a unprotected txt file and an unprotected download.php script, a guest can access sensitive information such as FTP credentials.

CVSS base metrics

  • Attack vector: network
  • Attack complexity: low
  • Privilege required: none
  • User interaction: none
  • Scope: unchanged
  • Confidentiality: high
  • Integrity: none
  • Availability: none

Vector string: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Possible malicious usage

  • Data leaks

Other recommendations

  • It’s recommended to upgrade to the latest version of the module ordersexport.
  • You should restrict access to the folder modules/ordersexport/ to a given whitelist


2023-10-19Issue discovered during a code review by TouchWeb.fr
2023-10-19Contact PrestaShop Addons security Team to confirm version scope by author
2023-10-19PrestaShop Addons security Team confirms version scope by author
2024-02-07Author provide a patch
2024-03-11Received CVE ID
2024-03-14Publish this security advisory


Leave a Reply

Your email address will not be published. Required fields are marked *