Malicious actors are exploiting a previously unknown security flaw in the open source PrestaShop e-commerce platform to inject malicious skimmer code designed to swipe sensitive information.
“Attackers have found a way to use a security vulnerability to carry out arbitrary code execution in servers running PrestaShop websites,” the company noted in an advisory published on July 22.
PrestaShop is marketed as the leading open-source e-commerce solution in Europe and Latin America, used by nearly 300,000 online merchants worldwide.
The goal of the infections is to introduce malicious code capable of stealing payment information entered by customers on checkout pages. Shops using outdated versions of the software or other vulnerable third-party modules appear to be the prime targets.
The PrestaShop maintainers also said they found a zero-day flaw in its service that they said has been addressed in version 188.8.131.52, although they cautioned that “we cannot be sure that it’s the only way for them to perform the attack.”
“This security fix strengthens the MySQL Smarty cache storage against code injection attacks,” PrestaShop noted. “This legacy feature is maintained for backward compatibility reasons and will be removed from future PrestaShop versions.”
The issue in question is an SQL injection vulnerability affecting versions 184.108.40.206 or greater, and is being tracked as CVE-2022-36408.
Successful exploitation of the flaw could enable an attacker to submit a specially crafted request that grants the ability to execute arbitrary instructions, in this case, inject a fake payment form on the checkout page to gather credit card information.
The development follows a wave of Magecart attacks targeting restaurant ordering platforms MenuDrive, Harbortouch, and InTouchPOS, leading to the compromise of at least 311 restaurants.