Clarification on the Security Incident
We experienced this exact situation on a webshop we maintain. We have performed a thorough analysis and documented the entire case.
Attack Vector and Execution
he attacker performed a single, targeted login attempt on the back office, resulting in:
1: A direct, successful hit on the admin URL (which is unique and obfuscated).
2: An immediate successful login via an Addons support account.
Once access was gained, the attacker installed a malicious module named "mloader". This module created two overrides in head.tpl and layout-both-columns.tpl, using the exact code described in the recent security mailing from Prestashop. Additionally, communication with the attacker's server was handled via an in.php file placed in the public_html directory.
Investigation into the Source
We investigated how these specific credentials could have been compromised. Our audit confirmed that the only place these credentials were ever shared was within the Addons Marketplace, specifically for support on a module developed by Prestashop itself.
Searching for a potential "Prestashop data breach" reveals reports claiming that over 21 million customer records were leaked from the Prestashop Marketplace:
https://socradar.io/prestashop-data-panorabanques-new-fraud-services/
Communication with Prestashop
We officially opened a case with the Prestashop security team in November 2025, providing all our findings. At that time, they stated they were investigating the potential breach but provided no confirmation. Despite us providing additional information about what happend, we never received a final response or follow-up.
Conclusion
Since other webshops are now being affected and Prestashop continues to claim the origin of the vulnerability is unknown, I feel obliged to make these findings public. The evidence strongly suggests that a data breach occurred and that credentials shared through the official Marketplace were leaked.
.png.022b5452a8f28f552bc9430097a16da2.png)