Security researchers at Sansec have just published an alert: over 200 PrestaShop stores are currently vulnerable to a total takeover through a single forgotten folder. The worst part? The fix takes 2 minutes. But if you do nothing, an attacker can become administrator of your store, steal your customers' data, and install backdoors on your server.
Here is what you need to know and how to protect yourself.
What is this flaw?
When you install PrestaShop, an /install/ folder (or /install-dev/ on development versions) is created on your server. This folder holds the setup wizard: database connection, admin account creation, site configuration.
In theory, you should delete this folder after installation. In practice, many merchants don't. And PrestaShop doesn't always remove it automatically.
Result: anyone can go to your-store.com/install/ and rerun the installation.
What an attacker can do
The exploit is ruthlessly simple:
- Rewrite the database config — The installer accepts parameters like
dbServer,dbName,dbLogin,dbPassword. The attacker redirects your store to their own database. - Create an admin account — By rerunning the install step (
?step=process), the attacker creates an admin with their own credentials. - Execute code on your server — Once admin, they upload a malicious module. PrestaShop uses
eval()on override files during module install, which allows arbitrary code execution. - Install backdoors — Web shells, data-stealing scripts, credit card skimmers... The attacker has total, persistent access.
Who is affected?
You are potentially vulnerable if:
- You installed PrestaShop manually (not through an auto-installer from your host)
- You never checked whether the
/install/or/install-dev/folder still exists on your server - You've done a migration or update that may have recreated the install folder
- You're on a development build with the
/install-dev/folder still present - Your host restored a backup that included the install folder
How to check if you're vulnerable (30 seconds)
Open your browser and type:
https://your-store.com/install/
https://your-store.com/install-dev/
If you see the PrestaShop setup wizard or any content other than a 404 error: you're vulnerable. Act immediately.
If you get a 404 or "Not Found" page: the folder is not accessible. But still verify via FTP that the folder doesn't exist at all on the server (it may be .htaccess-protected but still present).
How to fix it
1. Delete the install folders
Connect to your server via FTP (FileZilla, WinSCP) or SSH and delete:
rm -rf /path/to/your-store/install/
rm -rf /path/to/your-store/install-dev/
This is the main fix. Without the folder, the attack is impossible.
2. Disable debug mode
Make sure debug mode is off in production. In config/defines.inc.php:
define('_PS_MODE_DEV_', false);
Debug mode exposes technical details that make attacks easier.
3. Check no unknown admin was created
In your back-office, go to Advanced parameters > Team > Employees. If you see an account you don't recognise: your store may already be compromised. Delete it immediately and run a full security audit.
4. Scan your store
Even after deleting the folder, if it was exposed for a while an attacker may have already acted. Look for:
- Unknown PHP files in
/modules/,/override/,/upload/,/img/ - Recent modifications on core files (check modification dates)
- Admin accounts you didn't create
- Suspicious redirects (test your store from Google in incognito mode)
Not comfortable doing it yourself? We handle it.
If you're not at ease with FTP, SSH or file scanning, don't take the risk. Our PrestaShop experts intervene within minutes:
- Full server check (exposed folders, suspicious files, admin accounts)
- Secure removal of install folders and any malicious code
- Anti-malware scan of your entire store
- Detailed report of what was found and fixed
- Preventive hardening so it doesn't happen again
Go further: audit your PrestaShop security
This flaw is just one of dozens that can hit your store. Outdated modules, tampered files, overly open permissions, weak passwords... A full security audit finds every weakness before an attacker does.
Frequently asked questions
Go further
Having the same issue?
Describe your problem, our team will respond in under 10 minutes with a free diagnosis.
Get a free diagnosis