PrestaShop vulnerabilities are a natural part of a software's lifecycle. Acknowledging, fixing, and publishing them responsibly is a sign of professionalism and an ethical commitment to merchants, agencies, and the entire PrestaShop community.
This charter is offered to module developers who wish to engage in a transparent and trustworthy approach.
This charter follows up on the announcements made during the Dev PrestaShop Conference 2024, which was the subject of an article on the official PrestaShop blog.
Only developers who sell on the PrestaShop Marketplace and adhere to this charter will be eligible-due to legal constraints (in particular, the reciprocity of the non-aggression clause required by YesWeHack)-for our Bug Bounty program launched on YesWeHack, in partnership with PrestaShop SA.
This initiative, entirely free of charge, is offered by TouchWeb in the spirit of responsible contribution to the PrestaShop ecosystem. There is no fee required to join the charter, use the badge, or be listed among the members.
All merchants accepting online payments must comply with the PCI DSS security standard. (Payment Card Industry Data Security Standard), or one of its simplified versions - at a minimum, SAQ-A - when using a payment service provider via redirection or iframe (e.g., PayPal, Stripe, PayPlug, etc.).
Section 6.2 of the standard requires the prompt application of security patches for all identified vulnerabilities, including those found in PrestaShop modules used by the merchant. This requirement implies:
The charter also aims to enable e-commerce professionals to fulfill their contractual obligations with their banks or payment service providers.
For the more technical among you: the current tolerance granted by banks regarding SAQ compliance stems from a lack of understanding of the specificities of e-commerce CMS platforms. If module developers and integrators fail to take responsibility quickly, this tolerance could vanish - pushing many merchants from SAQ A to SAQ A-EP, which is significantly more demanding in terms of compliance. This shift will become inevitable as soon as banks realize the need to ensure the integrity of payment pages to counter modern web skimming techniques. Attacks are evolving: traditional XSS with off-site exfiltration is being replaced by RCEs involving SSRF, where exfiltration occurs on-site, rendering CSP protections ineffective. Only active security measures - such as WAF, IPS, and FIM - can effectively counter this threat today.
By joining this charter, you commit to:
No software is flawless. A discovered, fixed, and responsibly published vulnerability is a sign of a serious publisher - not a failure.
You commit to responding respectfully and constructively to anyone reporting a vulnerability with a CVSS score, validated by TouchWeb, ≥ 7.5 (or ≥ 4.0 if possible), avoiding denial or legal threats.
An initial response must be provided within 7 calendar days to acknowledge receipt and begin handling the report.
A patch must be delivered within 30 calendar days and officially published within 3 to 12 months depending on ecosystem update complexity and severity.
You agree to clearly document each security fix with a CVSS score ≥ 7.5 (or ≥ 4.0 if possible), including:
A significant number of merchants are unfamiliar with the concept of MCS (Security Maintenance). As a result, we regularly observe questionable practices regarding module updates, even when critical vulnerabilities have been patched.
From a legal standpoint, as module developers, you are protected by the copyleft inherited from PrestaShop's license. However, this is not the case for agencies and managed service providers, who fully assume legal responsibility for the RMP (Risk Mitigation Plan) within client environments (TMA, managed services).
This is why we ask you, out of professional solidarity, to provide a fix in the form of a simple and quick patch whenever a security issue is addressed. A full module update will, in many cases, be rejected by the client - out of caution, budget limitations, or lack of understanding. A focused patch allows timely and efficient action.
TouchWeb can help: we are also PHP developers and can assist you in writing a minimal, stable and deployable fix, ensuring your response meets both the technical and ethical expectations.
It is important to highlight a structural antagonism: publishing a patch is essential, but it also publicly exposes the vulnerability vector, mechanically allowing any intermediate to senior-level attacker to derive a PoC (Proof of Concept - a malicious payload used to exploit the flaw).
This is a well-known tension: fixing is already a partial disclosure.
TouchWeb SAS has never published a targeted PoC, except in cases of proven exploitation detected through our weak signal monitoring tools. In such cases, its release becomes a defensive lever, particularly for technical solutions that do not follow the OWASP CRS recommendations and rely on blacklist-based mechanisms that require concrete signatures to be effective.
Users must be informed of every fix without barriers or opacity.
White-label module providers must contractually require their clients to publish corrected vulnerabilities through a security advisory with a CVE ID. Transparency cannot be waived for commercial confidentiality.
Transparency regarding security must never be hindered by confidentiality clauses.
In case of uncertainty about impact, TouchWeb commits to assisting with CVSS impact analysis.
You authorize TouchWeb's DevSecOps team to request a full copy of one or more of your modules at any time as part of a preventive or corrective security process.
This request is subject to the confidentiality of analysis unless a CVSS score ≥ 7.5 vulnerability is identified.
Module developers commit to maintaining a publicly accessible page (referred to as their “security page”), which will be referenced on this page by TouchWeb.
This page, indexable by search engines (Google, Bing, etc.), must reflect their cybersecurity posture and explicitly include the following commitments:
This fosters trust with security researchers, agencies, and end-users through proactive transparency.
For the more technically inclined: starting January 1st, 2027, the threshold above which a vulnerability will be publicly disclosed will be lowered to a CVSS score ≥ 6.5. This measure aims to accelerate the cleanup of the ecosystem, particularly regarding vulnerabilities affecting back-offices, type 1 XSS (Reflected XSS), and CSRF flaws. This change has been deliberately postponed, as we believe the average level of security education across the market remains insufficient and resistance to these topics is still too widespread. We rely on the adherents to this charter to actively raise awareness within their teams and help reduce this friction, so that such vulnerabilities are eventually identified and addressed professionally by default.
Charter members acknowledge that the credibility of this initiative relies on a mutual commitment between TouchWeb and module developers.
As such, they commit to actively supporting the dissemination, legitimacy, and adoption of the charter, notably through the following actions:
Any promotion deemed ineffective or merely symbolic - including, but not limited to, the use of the "nofollow" attribute - may result in the invalidation of the charter membership, as it will be considered contrary to the spirit of sincere collaboration and mutual support expected from all members.
This dynamic of mutual engagement aims to strengthen the professionalization of the ecosystem, in the shared interest of developers, agencies, merchants, and security researchers.
The ultimate goal of this charter is to raise awareness among merchants, from the earliest stages of their projects, about the importance of selecting developers who apply rigorous security policies - adapted to a constantly evolving world and to the cybersecurity challenges posed by artificial intelligence.
Joining the charter is completely free and open. No form, signature, or prior registration is required.
Prerequisite: you must be a PrestaShop module developer.
To become a member, simply:
Once your page is verified and indexed by the SERPs, you will be added to the list of committed publishers.
No contractual validation is required: publishing the page is considered as your commitment. Transparency is what matters.
You can find an example here: Example of a security policy page
Note: Deindexing your security page from the SERPs will be considered as a withdrawal of your commitment.
As a member, you are not alone. TouchWeb supports you in making this approach possible and beneficial:
TouchWeb helps you define an objective CVSS (Common Vulnerability Scoring System) score based on standardized criteria: access vector, complexity, privileges, impact, etc.
TouchWeb supports you step by step in drafting a security advisory and requesting a CVE identifier, ensuring responsible disclosure that benefits the community.
Charter members will be able to:
Use of the "Responsible Cybersecurity" badge (image above) is strictly regulated. This badge is a sign of ethical commitment to securing PrestaShop modules and ensuring transparency in development practices.
Any use of this badge on a web page must include a clickable link directly on the image, pointing to the official page of the Responsible Cybersecurity Charter.
This link allows agencies and merchants to verify the legitimacy of the developer's commitment and to review the detailed principles they adhere to. Failure to include this link constitutes a breach of the badge usage terms and may result in revocation of authorization to use it.
This badge is strictly reserved for developers who have officially signed the charter and are listed on the reference page.
We rely on the members to actively promote this initiative.
The following publishers have officially endorsed the TouchWeb charter for responsible cybersecurity:
| ✅ | Publisher | Official store |
PrestaShop Marketplace |
Security policy |
|---|---|---|---|---|
| ✅ | 2N Technologies | |||
| ✅ | Adilis | |||
| ✅ | Aikini | |||
| ✅ | Algo Factory | |||
| ✅ | Ambris | |||
| ✅ | Arpa3 | |||
| ✅ | Arnaud Merigeau | |||
| ✅ | Autour du Digital | |||
| ✅ | BusinessTech | |||
| ✅ | CibleWeb | |||
| ✅ | Com'onSoft | |||
| ✅ | Comptoir du code | |||
| ✅ | Dream me up | |||
| ✅ | Ébewè | |||
| ✅ | Ecomiz | |||
| ✅ | EtherCreation | |||
| ✅ | Home Made.io | |||
| ✅ | idnovate.com | |||
| ✅ | JPresta | |||
| ✅ | KerAwen | |||
| ✅ | Kiwik | |||
| ✅ | Kixell Tag | |||
| ✅ | La Bulle | |||
| ✅ | LibraSoft | |||
| ✅ | Loulou66 | |||
| ✅ | Lyondev | |||
| ✅ | Mediacom87 | |||
| ✅ | Mintfull Agency | |||
| ✅ | NDK Design | |||
| ✅ | Nemesis tech | |||
| ✅ | Netenvie | |||
| ✅ | Opart | |||
| ✅ | PhenixInfo | |||
| ✅ | PrestaEdit | |||
| ✅ | PrestaModule | |||
| ✅ | PrestaPlugins | |||
| ✅ | PrestaRocket | |||
| ✅ | PrestaSafe | |||
| ✅ | 📌 PrestaShop | |||
| ✅ | RealDev | |||
| ✅ | Reversia | |||
| ✅ | SeriousWeb | |||
| ✅ | Sitolog | |||
| ✅ | Softizy | |||
| ✅ | Soledis | |||
| ✅ | StoreCommander | |||
| ✅ | TuniSoft Solutions | |||
| ✅ | Ukoo / EveryParts | |||
| ✅ | Web Premiere |
| ✅ | Publisher | Official store |
PrestaShop Marketplace |
Security policy |
|---|---|---|---|---|
| 202-ecommerce | In progress | |||
| Divioseo | In progress | |||
| DM Concept | In progress | |||
| E-Frogg | In progress | |||
| HiPresta | In progress | |||
| MDWeb | In progress | |||
| Nukium | In progress | |||
| ScaleDEV | In progress | |||
| TimActive | In progress |