CVE-2025-22384: CWE-472 External Control of Assumed-Immutable Web Parameter
CVE-2025-22384 is a high-severity business logic vulnerability in Optimizely Configured Commerce versions before 5. 2. 2408. It allows unauthenticated storefront visitors to purchase discontinued products by manipulating web requests before they reach the server. The flaw stems from external control of an assumed-immutable web parameter, classified under CWE-472. Exploitation requires no user interaction or privileges and can lead to unauthorized transactions involving products that should no longer be available. Although no known exploits are reported in the wild, the vulnerability has a CVSS score of 7. 5, indicating significant confidentiality impact without affecting integrity or availability. Organizations using affected versions of Optimizely Configured Commerce should prioritize patching or apply mitigations to prevent abuse. Countries with strong e-commerce sectors and significant Optimizely market presence are at higher risk.
AI Analysis
Technical Summary
CVE-2025-22384 identifies a business logic vulnerability in Optimizely Configured Commerce prior to version 5.2.2408. The issue is categorized under CWE-472, which involves external control of an assumed-immutable web parameter. In this case, the vulnerability allows attackers—without authentication or user interaction—to manipulate HTTP requests to the storefront application, enabling the purchase of products that have been discontinued and should no longer be available for sale. The root cause lies in the application’s failure to properly validate or enforce immutability on certain web parameters that control product availability status. This flaw can be exploited remotely over the network (AV:N) with low attack complexity (AC:L), and no privileges or user interaction are required (PR:N, UI:N). The vulnerability impacts confidentiality by potentially exposing business logic and transactional data related to discontinued products, but does not affect integrity or availability. Although no public exploits have been reported, the vulnerability’s CVSS 3.1 base score is 7.5, reflecting its high severity. The lack of patch links suggests that a fix may be pending or not publicly disclosed at the time of reporting. Organizations relying on Optimizely Configured Commerce for B2B storefronts should be aware of this issue as it could lead to unauthorized transactions, financial losses, and erosion of customer trust. The vulnerability highlights the importance of robust parameter validation and business logic enforcement in e-commerce platforms.
Potential Impact
The primary impact of CVE-2025-22384 is the unauthorized purchase of discontinued products, which can lead to direct financial losses for merchants and confusion in inventory management. Attackers exploiting this vulnerability can bypass business rules designed to prevent sales of obsolete or unavailable items, potentially resulting in revenue leakage and increased operational overhead to resolve fraudulent or invalid orders. Additionally, the exposure of business logic flaws may aid attackers in crafting further attacks or exploiting other weaknesses in the commerce platform. While the vulnerability does not compromise system integrity or availability, the confidentiality impact is significant as it reveals internal product lifecycle controls and transactional processes. For organizations worldwide, especially those with large-scale e-commerce operations using Optimizely Configured Commerce, this vulnerability could undermine customer trust and damage brand reputation. The absence of required authentication and user interaction lowers the barrier to exploitation, increasing the risk of automated or large-scale abuse. Although no known exploits exist currently, the potential for future exploitation necessitates proactive mitigation to avoid financial and reputational harm.
Mitigation Recommendations
To mitigate CVE-2025-22384, organizations should prioritize upgrading to Optimizely Configured Commerce version 5.2.2408 or later once a patch is available. In the interim, implement strict server-side validation of all web parameters related to product availability and purchasing workflows to ensure that discontinued products cannot be ordered regardless of client-side input. Employ input validation and parameter integrity checks using cryptographic methods such as signed tokens or HMACs to prevent tampering of assumed-immutable parameters. Monitor transaction logs for unusual purchase patterns involving discontinued products and establish alerting mechanisms for suspicious activity. Restrict API endpoints and storefront request handling to reject requests with invalid or manipulated parameters. Conduct thorough code reviews and business logic testing to identify and remediate similar weaknesses. Additionally, consider implementing rate limiting and anomaly detection to reduce the risk of automated exploitation attempts. Educate development and security teams about the risks of external control over immutable parameters to prevent recurrence in future releases.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, Japan, South Korea, Singapore
CVE-2025-22384: CWE-472 External Control of Assumed-Immutable Web Parameter
Description
CVE-2025-22384 is a high-severity business logic vulnerability in Optimizely Configured Commerce versions before 5. 2. 2408. It allows unauthenticated storefront visitors to purchase discontinued products by manipulating web requests before they reach the server. The flaw stems from external control of an assumed-immutable web parameter, classified under CWE-472. Exploitation requires no user interaction or privileges and can lead to unauthorized transactions involving products that should no longer be available. Although no known exploits are reported in the wild, the vulnerability has a CVSS score of 7. 5, indicating significant confidentiality impact without affecting integrity or availability. Organizations using affected versions of Optimizely Configured Commerce should prioritize patching or apply mitigations to prevent abuse. Countries with strong e-commerce sectors and significant Optimizely market presence are at higher risk.
AI-Powered Analysis
Technical Analysis
CVE-2025-22384 identifies a business logic vulnerability in Optimizely Configured Commerce prior to version 5.2.2408. The issue is categorized under CWE-472, which involves external control of an assumed-immutable web parameter. In this case, the vulnerability allows attackers—without authentication or user interaction—to manipulate HTTP requests to the storefront application, enabling the purchase of products that have been discontinued and should no longer be available for sale. The root cause lies in the application’s failure to properly validate or enforce immutability on certain web parameters that control product availability status. This flaw can be exploited remotely over the network (AV:N) with low attack complexity (AC:L), and no privileges or user interaction are required (PR:N, UI:N). The vulnerability impacts confidentiality by potentially exposing business logic and transactional data related to discontinued products, but does not affect integrity or availability. Although no public exploits have been reported, the vulnerability’s CVSS 3.1 base score is 7.5, reflecting its high severity. The lack of patch links suggests that a fix may be pending or not publicly disclosed at the time of reporting. Organizations relying on Optimizely Configured Commerce for B2B storefronts should be aware of this issue as it could lead to unauthorized transactions, financial losses, and erosion of customer trust. The vulnerability highlights the importance of robust parameter validation and business logic enforcement in e-commerce platforms.
Potential Impact
The primary impact of CVE-2025-22384 is the unauthorized purchase of discontinued products, which can lead to direct financial losses for merchants and confusion in inventory management. Attackers exploiting this vulnerability can bypass business rules designed to prevent sales of obsolete or unavailable items, potentially resulting in revenue leakage and increased operational overhead to resolve fraudulent or invalid orders. Additionally, the exposure of business logic flaws may aid attackers in crafting further attacks or exploiting other weaknesses in the commerce platform. While the vulnerability does not compromise system integrity or availability, the confidentiality impact is significant as it reveals internal product lifecycle controls and transactional processes. For organizations worldwide, especially those with large-scale e-commerce operations using Optimizely Configured Commerce, this vulnerability could undermine customer trust and damage brand reputation. The absence of required authentication and user interaction lowers the barrier to exploitation, increasing the risk of automated or large-scale abuse. Although no known exploits exist currently, the potential for future exploitation necessitates proactive mitigation to avoid financial and reputational harm.
Mitigation Recommendations
To mitigate CVE-2025-22384, organizations should prioritize upgrading to Optimizely Configured Commerce version 5.2.2408 or later once a patch is available. In the interim, implement strict server-side validation of all web parameters related to product availability and purchasing workflows to ensure that discontinued products cannot be ordered regardless of client-side input. Employ input validation and parameter integrity checks using cryptographic methods such as signed tokens or HMACs to prevent tampering of assumed-immutable parameters. Monitor transaction logs for unusual purchase patterns involving discontinued products and establish alerting mechanisms for suspicious activity. Restrict API endpoints and storefront request handling to reject requests with invalid or manipulated parameters. Conduct thorough code reviews and business logic testing to identify and remediate similar weaknesses. Additionally, consider implementing rate limiting and anomaly detection to reduce the risk of automated exploitation attempts. Educate development and security teams about the risks of external control over immutable parameters to prevent recurrence in future releases.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-01-04T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6b1bb7ef31ef0b54e2f6
Added to database: 2/25/2026, 9:35:23 PM
Last enriched: 2/25/2026, 10:11:41 PM
Last updated: 2/26/2026, 6:18:03 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumCVE-2026-2499: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tgrk Custom Logo
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.