Security for everyone

CVE-2021-36748 Scanner

Detects 'SQL Injection (SQLi)' vulnerability in Prestahome Blog module for Prestashop affects v. before 1.7.8.


Short Info




Single Scan

Can be used by

Asset Owner

Estimated Time

10 sec

Scan only one

Domain, Ipv4

Parent Category

CVE-2021-36748 Scanner Detail

The Prestahome Blog module for Prestashop is a widely-used tool designed to manage and publish blog content on an e-commerce website. It provides website owners with an elegant and user-friendly interface that enables them to add blog posts, organize them by category, and allow users to comment and share their thoughts.

However, one of the biggest challenges for this module is its vulnerability to cyber-attacks, such as the CVE-2021-36748 vulnerability. This flaw allows attackers to inject malicious code into the sb_category parameter of the list controller, allowing them to extract sensitive information from the database. The attack can occur from any remote device running on the internet, and the attacker can gain access to the database through an SQL injection attack.

If exploited, this vulnerability may result in the unauthorized access to sensitive information such as user data, payment details, login credentials, and other forms of confidential information. This could lead to a data breach, leading to the loss of reputation, trust from customers, as well as legal ramifications and financial losses caused by a data breach.

It's essential to always prioritize the safety and security of digital assets. The proactive defense mechanism, automated vulnerability scanning, monitoring, and reporting features of the platform can provide for an easy, quick, and comprehensive way of detecting vulnerabilities. It gives businesses and organizations an edge in protecting their digital assets from cyber-attacks, lockdown, and secure their system wholly. Don’t hesitate to visit now and be empowered with the latest security measures.



cyber security services for everyone one. Free security tools, continuous vulnerability scanning and many more.
Try it yourself,
control security posture