Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-22384: CWE-472 External Control of Assumed-Immutable Web Parameter

0
High
VulnerabilityCVE-2025-22384cvecve-2025-22384cwe-472
Published: Sat Jan 04 2025 (01/04/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2025-22384 is a high-severity business logic vulnerability in Optimizely Configured Commerce versions before 5. 2. 2408. It allows unauthenticated storefront visitors to purchase discontinued products by manipulating web requests before they reach the server. The flaw stems from external control of an assumed-immutable web parameter, classified under CWE-472. Exploitation requires no user interaction or privileges and can lead to unauthorized transactions involving products that should no longer be available. Although no known exploits are reported in the wild, the vulnerability has a CVSS score of 7. 5, indicating significant confidentiality impact without affecting integrity or availability. Organizations using affected versions of Optimizely Configured Commerce should prioritize patching or apply mitigations to prevent abuse. Countries with strong e-commerce sectors and significant Optimizely market presence are at higher risk.

AI-Powered Analysis

AILast updated: 02/25/2026, 22:11:41 UTC

Technical Analysis

CVE-2025-22384 identifies a business logic vulnerability in Optimizely Configured Commerce prior to version 5.2.2408. The issue is categorized under CWE-472, which involves external control of an assumed-immutable web parameter. In this case, the vulnerability allows attackers—without authentication or user interaction—to manipulate HTTP requests to the storefront application, enabling the purchase of products that have been discontinued and should no longer be available for sale. The root cause lies in the application’s failure to properly validate or enforce immutability on certain web parameters that control product availability status. This flaw can be exploited remotely over the network (AV:N) with low attack complexity (AC:L), and no privileges or user interaction are required (PR:N, UI:N). The vulnerability impacts confidentiality by potentially exposing business logic and transactional data related to discontinued products, but does not affect integrity or availability. Although no public exploits have been reported, the vulnerability’s CVSS 3.1 base score is 7.5, reflecting its high severity. The lack of patch links suggests that a fix may be pending or not publicly disclosed at the time of reporting. Organizations relying on Optimizely Configured Commerce for B2B storefronts should be aware of this issue as it could lead to unauthorized transactions, financial losses, and erosion of customer trust. The vulnerability highlights the importance of robust parameter validation and business logic enforcement in e-commerce platforms.

Potential Impact

The primary impact of CVE-2025-22384 is the unauthorized purchase of discontinued products, which can lead to direct financial losses for merchants and confusion in inventory management. Attackers exploiting this vulnerability can bypass business rules designed to prevent sales of obsolete or unavailable items, potentially resulting in revenue leakage and increased operational overhead to resolve fraudulent or invalid orders. Additionally, the exposure of business logic flaws may aid attackers in crafting further attacks or exploiting other weaknesses in the commerce platform. While the vulnerability does not compromise system integrity or availability, the confidentiality impact is significant as it reveals internal product lifecycle controls and transactional processes. For organizations worldwide, especially those with large-scale e-commerce operations using Optimizely Configured Commerce, this vulnerability could undermine customer trust and damage brand reputation. The absence of required authentication and user interaction lowers the barrier to exploitation, increasing the risk of automated or large-scale abuse. Although no known exploits exist currently, the potential for future exploitation necessitates proactive mitigation to avoid financial and reputational harm.

Mitigation Recommendations

To mitigate CVE-2025-22384, organizations should prioritize upgrading to Optimizely Configured Commerce version 5.2.2408 or later once a patch is available. In the interim, implement strict server-side validation of all web parameters related to product availability and purchasing workflows to ensure that discontinued products cannot be ordered regardless of client-side input. Employ input validation and parameter integrity checks using cryptographic methods such as signed tokens or HMACs to prevent tampering of assumed-immutable parameters. Monitor transaction logs for unusual purchase patterns involving discontinued products and establish alerting mechanisms for suspicious activity. Restrict API endpoints and storefront request handling to reject requests with invalid or manipulated parameters. Conduct thorough code reviews and business logic testing to identify and remediate similar weaknesses. Additionally, consider implementing rate limiting and anomaly detection to reduce the risk of automated exploitation attempts. Educate development and security teams about the risks of external control over immutable parameters to prevent recurrence in future releases.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-01-04T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6b1bb7ef31ef0b54e2f6

Added to database: 2/25/2026, 9:35:23 PM

Last enriched: 2/25/2026, 10:11:41 PM

Last updated: 2/26/2026, 6:18:03 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats