Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-22383: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')

0
Medium
VulnerabilityCVE-2025-22383cvecve-2025-22383cwe-79
Published: Sat Jan 04 2025 (01/04/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2025-22383 is a medium-severity cross-site scripting (XSS) vulnerability found in Optimizely Configured Commerce versions before 5. 2. 2408, specifically affecting the Contact Us functionality in the Commerce B2B application. This vulnerability arises from improper input validation that allows unfiltered HTML markup to be included in email messages sent via the Contact Us form. Exploitation requires low privileges and user interaction, but no known exploits are currently reported in the wild. The vulnerability can lead to limited confidentiality and integrity impacts, such as session hijacking or phishing, but does not affect availability. Organizations using affected versions should apply patches once available and implement strict input sanitization and output encoding to mitigate risks. Countries with significant Optimizely Configured Commerce usage and B2B e-commerce sectors are at higher risk. The CVSS score is 4. 6, reflecting a medium severity level.

AI-Powered Analysis

AILast updated: 02/25/2026, 22:11:25 UTC

Technical Analysis

CVE-2025-22383 is a vulnerability categorized under CWE-79, indicating improper neutralization of input during web page generation, commonly known as cross-site scripting (XSS). This issue affects Optimizely Configured Commerce versions prior to 5.2.2408, specifically within the Commerce B2B application's Contact Us functionality. The vulnerability stems from insufficient input validation that allows attackers to inject unfiltered HTML markup into email messages sent through the Contact Us form. Because the input is not properly sanitized or encoded, malicious actors can craft payloads that execute arbitrary scripts in the context of the victim's browser when the email content is viewed or processed. The CVSS v3.1 base score is 4.6, with vector AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N, indicating network attack vector, low attack complexity, requiring low privileges and user interaction, with impacts on confidentiality and integrity but no impact on availability. No public exploits or widespread exploitation have been reported to date. The vulnerability could be leveraged for phishing, session hijacking, or delivering malicious payloads to users interacting with the affected Contact Us feature. The lack of patch links suggests that a fix may be pending or not yet publicly released. This vulnerability highlights the importance of proper input validation and output encoding in web applications, especially in user-facing forms that generate emails or other content.

Potential Impact

The primary impact of CVE-2025-22383 is the potential execution of malicious scripts via the Contact Us form in Optimizely Configured Commerce B2B applications. This can lead to confidentiality breaches such as theft of session tokens or user credentials if attackers successfully execute scripts in the context of legitimate users or administrators. Integrity may also be affected if attackers manipulate displayed content or email messages. However, the vulnerability does not impact system availability. Organizations using affected versions may face increased risk of phishing attacks, social engineering, or unauthorized access to sensitive information. Since exploitation requires user interaction and low privileges, the attack surface is somewhat limited but still significant in environments where the Contact Us form is publicly accessible. The absence of known exploits in the wild reduces immediate risk but does not eliminate the potential for future attacks. Overall, the vulnerability could undermine trust in affected e-commerce platforms and lead to reputational damage and compliance issues if exploited.

Mitigation Recommendations

To mitigate CVE-2025-22383, organizations should prioritize updating Optimizely Configured Commerce to version 5.2.2408 or later once the patch is released. Until then, implement strict input validation and sanitization on the Contact Us form to filter out HTML tags and scripts. Employ context-aware output encoding when rendering user input in emails or web pages to prevent script execution. Additionally, consider implementing Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts. Monitor logs for suspicious input patterns or repeated attempts to inject HTML or JavaScript. Limit the privileges of users who can access or manage the Contact Us functionality to reduce risk. Educate staff and users about phishing risks and suspicious email content. Finally, conduct regular security assessments and penetration tests focusing on input validation and email generation features to detect similar vulnerabilities proactively.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-01-04T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6b1bb7ef31ef0b54e2f3

Added to database: 2/25/2026, 9:35:23 PM

Last enriched: 2/25/2026, 10:11:25 PM

Last updated: 2/26/2026, 11:23:33 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats