Skip to main content

CVE-2022-31000: CWE-352: Cross-Site Request Forgery (CSRF) in solidusio solidus

Medium
Published: Wed Jun 01 2022 (06/01/2022, 17:25:11 UTC)
Source: CVE
Vendor/Project: solidusio
Product: solidus

Description

solidus_backend is the admin interface for the Solidus e-commerce framework. Versions prior to 3.1.6, 3.0.6, and 2.11.16 contain a cross-site request forgery (CSRF) vulnerability. The vulnerability allows attackers to change the state of an order's adjustments if they hold its number, and the execution happens on a store administrator's computer. Users should upgrade to solidus_backend 3.1.6, 3.0.6, or 2.11.16 to receive a patch.

AI-Powered Analysis

AILast updated: 06/22/2025, 00:51:17 UTC

Technical Analysis

CVE-2022-31000 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the solidus_backend component of the Solidus e-commerce framework. Solidus is an open-source platform widely used for building online stores, and solidus_backend serves as the administrative interface for store management. The vulnerability affects versions prior to 3.1.6, 3.0.6, and 2.11.16, allowing an attacker who knows an order's number to manipulate the state of that order's adjustments. This manipulation occurs when the malicious request is executed in the context of an authenticated store administrator's browser session. Essentially, the attacker tricks the administrator into unknowingly submitting a crafted request that changes order details, potentially altering pricing, discounts, or other financial adjustments tied to an order. The vulnerability arises because the affected versions do not adequately verify the origin of state-changing requests, failing to implement proper anti-CSRF tokens or other protective mechanisms. Exploitation requires the attacker to have the order number and to lure an authenticated admin into interacting with a malicious webpage or link, which then triggers the unauthorized state change. The issue was addressed in solidus_backend versions 3.1.6, 3.0.6, and 2.11.16, where patches introduced proper CSRF protections to prevent such unauthorized requests.

Potential Impact

For European organizations using the Solidus e-commerce platform, this vulnerability poses a risk to the integrity of order data and potentially the financial transactions associated with online sales. An attacker exploiting this flaw could alter order adjustments such as discounts, surcharges, or tax calculations, leading to financial discrepancies, revenue loss, or customer dissatisfaction. Since the attack requires an authenticated administrator session, the compromise of admin credentials or successful social engineering to induce admin interaction is a prerequisite. However, once exploited, it could undermine trust in the e-commerce system's reliability and data integrity. For organizations handling sensitive customer data or operating in regulated sectors (e.g., finance, retail with GDPR compliance), such unauthorized modifications could also raise compliance and audit concerns. The availability of the system is less directly impacted, but reputational damage and operational disruptions from investigating and remediating fraudulent orders could be significant. Given the administrative nature of the interface, the scope is limited to stores using vulnerable Solidus versions and having exposed or accessible admin interfaces.

Mitigation Recommendations

Organizations should immediately verify their Solidus version and upgrade to solidus_backend 3.1.6, 3.0.6, or 2.11.16 or later, where the CSRF vulnerability is patched. Beyond upgrading, administrators should enforce strict access controls on the admin interface, including IP whitelisting or VPN-only access to reduce exposure. Implement multi-factor authentication (MFA) for admin accounts to mitigate risks from credential compromise. Regularly audit order adjustments and logs for unusual changes that could indicate exploitation attempts. Employ Content Security Policy (CSP) headers and SameSite cookie attributes to reduce the risk of CSRF attacks. Educate administrators about phishing and social engineering tactics that could lead to inadvertent execution of malicious requests. Finally, consider implementing web application firewalls (WAFs) with rules to detect and block suspicious CSRF attempts targeting the admin endpoints.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-05-18T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9848c4522896dcbf65f4

Added to database: 5/21/2025, 9:09:28 AM

Last enriched: 6/22/2025, 12:51:17 AM

Last updated: 8/17/2025, 12:06:38 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats