CVE-2022-31000: CWE-352: Cross-Site Request Forgery (CSRF) in solidusio solidus
solidus_backend is the admin interface for the Solidus e-commerce framework. Versions prior to 3.1.6, 3.0.6, and 2.11.16 contain a cross-site request forgery (CSRF) vulnerability. The vulnerability allows attackers to change the state of an order's adjustments if they hold its number, and the execution happens on a store administrator's computer. Users should upgrade to solidus_backend 3.1.6, 3.0.6, or 2.11.16 to receive a patch.
AI Analysis
Technical Summary
CVE-2022-31000 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the solidus_backend component of the Solidus e-commerce framework. Solidus is an open-source platform widely used for building online stores, and solidus_backend serves as the administrative interface for store management. The vulnerability affects versions prior to 3.1.6, 3.0.6, and 2.11.16, allowing an attacker who knows an order's number to manipulate the state of that order's adjustments. This manipulation occurs when the malicious request is executed in the context of an authenticated store administrator's browser session. Essentially, the attacker tricks the administrator into unknowingly submitting a crafted request that changes order details, potentially altering pricing, discounts, or other financial adjustments tied to an order. The vulnerability arises because the affected versions do not adequately verify the origin of state-changing requests, failing to implement proper anti-CSRF tokens or other protective mechanisms. Exploitation requires the attacker to have the order number and to lure an authenticated admin into interacting with a malicious webpage or link, which then triggers the unauthorized state change. The issue was addressed in solidus_backend versions 3.1.6, 3.0.6, and 2.11.16, where patches introduced proper CSRF protections to prevent such unauthorized requests.
Potential Impact
For European organizations using the Solidus e-commerce platform, this vulnerability poses a risk to the integrity of order data and potentially the financial transactions associated with online sales. An attacker exploiting this flaw could alter order adjustments such as discounts, surcharges, or tax calculations, leading to financial discrepancies, revenue loss, or customer dissatisfaction. Since the attack requires an authenticated administrator session, the compromise of admin credentials or successful social engineering to induce admin interaction is a prerequisite. However, once exploited, it could undermine trust in the e-commerce system's reliability and data integrity. For organizations handling sensitive customer data or operating in regulated sectors (e.g., finance, retail with GDPR compliance), such unauthorized modifications could also raise compliance and audit concerns. The availability of the system is less directly impacted, but reputational damage and operational disruptions from investigating and remediating fraudulent orders could be significant. Given the administrative nature of the interface, the scope is limited to stores using vulnerable Solidus versions and having exposed or accessible admin interfaces.
Mitigation Recommendations
Organizations should immediately verify their Solidus version and upgrade to solidus_backend 3.1.6, 3.0.6, or 2.11.16 or later, where the CSRF vulnerability is patched. Beyond upgrading, administrators should enforce strict access controls on the admin interface, including IP whitelisting or VPN-only access to reduce exposure. Implement multi-factor authentication (MFA) for admin accounts to mitigate risks from credential compromise. Regularly audit order adjustments and logs for unusual changes that could indicate exploitation attempts. Employ Content Security Policy (CSP) headers and SameSite cookie attributes to reduce the risk of CSRF attacks. Educate administrators about phishing and social engineering tactics that could lead to inadvertent execution of malicious requests. Finally, consider implementing web application firewalls (WAFs) with rules to detect and block suspicious CSRF attempts targeting the admin endpoints.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Sweden, Poland
CVE-2022-31000: CWE-352: Cross-Site Request Forgery (CSRF) in solidusio solidus
Description
solidus_backend is the admin interface for the Solidus e-commerce framework. Versions prior to 3.1.6, 3.0.6, and 2.11.16 contain a cross-site request forgery (CSRF) vulnerability. The vulnerability allows attackers to change the state of an order's adjustments if they hold its number, and the execution happens on a store administrator's computer. Users should upgrade to solidus_backend 3.1.6, 3.0.6, or 2.11.16 to receive a patch.
AI-Powered Analysis
Technical Analysis
CVE-2022-31000 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the solidus_backend component of the Solidus e-commerce framework. Solidus is an open-source platform widely used for building online stores, and solidus_backend serves as the administrative interface for store management. The vulnerability affects versions prior to 3.1.6, 3.0.6, and 2.11.16, allowing an attacker who knows an order's number to manipulate the state of that order's adjustments. This manipulation occurs when the malicious request is executed in the context of an authenticated store administrator's browser session. Essentially, the attacker tricks the administrator into unknowingly submitting a crafted request that changes order details, potentially altering pricing, discounts, or other financial adjustments tied to an order. The vulnerability arises because the affected versions do not adequately verify the origin of state-changing requests, failing to implement proper anti-CSRF tokens or other protective mechanisms. Exploitation requires the attacker to have the order number and to lure an authenticated admin into interacting with a malicious webpage or link, which then triggers the unauthorized state change. The issue was addressed in solidus_backend versions 3.1.6, 3.0.6, and 2.11.16, where patches introduced proper CSRF protections to prevent such unauthorized requests.
Potential Impact
For European organizations using the Solidus e-commerce platform, this vulnerability poses a risk to the integrity of order data and potentially the financial transactions associated with online sales. An attacker exploiting this flaw could alter order adjustments such as discounts, surcharges, or tax calculations, leading to financial discrepancies, revenue loss, or customer dissatisfaction. Since the attack requires an authenticated administrator session, the compromise of admin credentials or successful social engineering to induce admin interaction is a prerequisite. However, once exploited, it could undermine trust in the e-commerce system's reliability and data integrity. For organizations handling sensitive customer data or operating in regulated sectors (e.g., finance, retail with GDPR compliance), such unauthorized modifications could also raise compliance and audit concerns. The availability of the system is less directly impacted, but reputational damage and operational disruptions from investigating and remediating fraudulent orders could be significant. Given the administrative nature of the interface, the scope is limited to stores using vulnerable Solidus versions and having exposed or accessible admin interfaces.
Mitigation Recommendations
Organizations should immediately verify their Solidus version and upgrade to solidus_backend 3.1.6, 3.0.6, or 2.11.16 or later, where the CSRF vulnerability is patched. Beyond upgrading, administrators should enforce strict access controls on the admin interface, including IP whitelisting or VPN-only access to reduce exposure. Implement multi-factor authentication (MFA) for admin accounts to mitigate risks from credential compromise. Regularly audit order adjustments and logs for unusual changes that could indicate exploitation attempts. Employ Content Security Policy (CSP) headers and SameSite cookie attributes to reduce the risk of CSRF attacks. Educate administrators about phishing and social engineering tactics that could lead to inadvertent execution of malicious requests. Finally, consider implementing web application firewalls (WAFs) with rules to detect and block suspicious CSRF attempts targeting the admin endpoints.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-05-18T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9848c4522896dcbf65f4
Added to database: 5/21/2025, 9:09:28 AM
Last enriched: 6/22/2025, 12:51:17 AM
Last updated: 8/17/2025, 12:06:38 AM
Views: 13
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.