PatchSiren

PatchSiren cyber security CVE debrief

CVE-2026-39079 PrestaShop CVE debrief

CVE-2026-39079 describes a sensitive-information disclosure issue in the PrestaShop UPSShipping module, affecting versions through at least 2.4.0. A remote attacker may be able to access data exposed through /modules/upsshipping/logs/ and /modules/upsshipping/lib/UPSBaseApi.php. Because the issue centers on exposed files and logs rather than code execution, the primary concern is unintended leakage of confidential operational data, credentials, or API-related information.

Vendor
PrestaShop
Product
UPSShipping
CVSS
HIGH 7.5
CISA KEV
Not listed in stored evidence
Original CVE published
2026-05-18
Original CVE updated
2026-05-18
Advisory published
2026-05-18
Advisory updated
2026-05-18

Who should care

Administrators and developers operating PrestaShop sites with the UPSShipping module enabled, especially where module files or logs may be reachable over the web.

Technical summary

The source corpus indicates that all versions of prestashop upsshipping through at least 2.4.0 may expose sensitive information via the /modules/upsshipping/logs/ path and the /modules/upsshipping/lib/UPSBaseApi.php component. The available references do not provide a CVSS vector, exploit steps, or confirmed downstream impact beyond information disclosure, so the most defensible reading is that improperly accessible module content can reveal sensitive data to remote parties.

Defensive priority

High for any internet-facing PrestaShop deployment using UPSShipping, because exposed logs or library files can leak secrets that may enable follow-on compromise.

Recommended defensive actions

  • Identify all PrestaShop instances using the UPSShipping module and confirm the installed version.
  • Verify that /modules/upsshipping/logs/ and related module files are not publicly accessible from the internet.
  • Remove or protect sensitive logs, backups, and configuration files that may contain credentials or API details.
  • Update or replace the UPSShipping module once a fixed release is available from the vendor.
  • Rotate any secrets, API keys, or tokens that may have been exposed.
  • Review web access logs for requests to the affected paths and investigate unusual retrieval activity.

Evidence notes

This debrief is based on the official NVD record and the referenced Esokia advisory URL included in the source corpus. The corpus explicitly states that the issue affects prestashop upsshipping through at least 2.4.0 and that sensitive information may be obtained via /modules/upsshipping/logs/ and /modules/upsshipping/lib/UPSBaseApi.php. No CVSS score, weakness ID, exploit details, confirmed remediation version, or fully settled vendor attribution were supplied.

Official resources

Published by the CVE/NVD record on 2026-05-18T15:16:25.533Z.