CVE-2025-22385: CWE-862 Missing Authorization
CVE-2025-22385 is a medium-severity vulnerability in Optimizely Configured Commerce versions before 5. 2. 2408. The issue arises because newly created B2B accounts do not require email confirmation, allowing attackers to mass-create accounts without user consent. This missing authorization flaw (CWE-862) can lead to database storage exhaustion and unauthorized account creation on behalf of visitors. Exploitation requires no authentication or user interaction but has a high attack complexity. No known exploits are currently reported in the wild. Organizations using affected versions should prioritize patching to prevent potential abuse and resource exhaustion.
AI Analysis
Technical Summary
CVE-2025-22385 is a vulnerability identified in Optimizely Configured Commerce prior to version 5.2.2408, specifically affecting the B2B application component. The root cause is a missing authorization control related to the account creation process: newly created accounts do not require email confirmation. This absence of verification enables attackers to automate the mass creation of accounts without any user consent or interaction. The vulnerability is classified under CWE-862 (Missing Authorization), indicating that the system fails to properly restrict access or actions to authorized users. The vulnerability's CVSS v3.1 base score is 5.9, reflecting a medium severity level, with vector metrics indicating network attack vector (AV:N), high attack complexity (AC:H), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no impact on confidentiality or integrity (C:N/I:N), but high impact on availability (A:H). The primary impact is the potential exhaustion of database storage due to the mass creation of unauthorized accounts, which could degrade or disrupt service availability. Additionally, the creation of non-requested storefront accounts on behalf of visitors could lead to administrative overhead and potential abuse scenarios. No patches or known exploits are currently documented, but the vulnerability is publicly disclosed and should be addressed promptly.
Potential Impact
The vulnerability allows attackers to create large numbers of unauthorized accounts without email confirmation, leading to potential database storage exhaustion and degraded service availability. This can cause denial-of-service conditions or increased operational costs due to resource consumption and account management overhead. While confidentiality and integrity are not directly impacted, the availability of the commerce platform could be significantly affected, disrupting business operations and customer experience. Organizations relying on Optimizely Configured Commerce for B2B storefronts may face service interruptions, increased support burden, and potential reputational damage if exploited. The lack of authentication and user interaction requirements lowers the barrier for exploitation, increasing the risk of automated abuse campaigns.
Mitigation Recommendations
Organizations should upgrade Optimizely Configured Commerce to version 5.2.2408 or later, where this issue is resolved. Until patching is possible, implement rate limiting and CAPTCHA challenges on account creation endpoints to mitigate automated mass account creation. Monitor account creation logs for unusual spikes or patterns indicative of abuse. Employ web application firewalls (WAFs) with rules targeting suspicious account creation behaviors. Review and tighten account verification processes, potentially adding manual or secondary verification steps. Regularly audit database storage and account inventories to detect and remove unauthorized or suspicious accounts. Coordinate with Optimizely support for any available interim fixes or guidance. Educate operational teams to recognize symptoms of exploitation and respond promptly.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, Japan, Sweden, Singapore
CVE-2025-22385: CWE-862 Missing Authorization
Description
CVE-2025-22385 is a medium-severity vulnerability in Optimizely Configured Commerce versions before 5. 2. 2408. The issue arises because newly created B2B accounts do not require email confirmation, allowing attackers to mass-create accounts without user consent. This missing authorization flaw (CWE-862) can lead to database storage exhaustion and unauthorized account creation on behalf of visitors. Exploitation requires no authentication or user interaction but has a high attack complexity. No known exploits are currently reported in the wild. Organizations using affected versions should prioritize patching to prevent potential abuse and resource exhaustion.
AI-Powered Analysis
Technical Analysis
CVE-2025-22385 is a vulnerability identified in Optimizely Configured Commerce prior to version 5.2.2408, specifically affecting the B2B application component. The root cause is a missing authorization control related to the account creation process: newly created accounts do not require email confirmation. This absence of verification enables attackers to automate the mass creation of accounts without any user consent or interaction. The vulnerability is classified under CWE-862 (Missing Authorization), indicating that the system fails to properly restrict access or actions to authorized users. The vulnerability's CVSS v3.1 base score is 5.9, reflecting a medium severity level, with vector metrics indicating network attack vector (AV:N), high attack complexity (AC:H), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no impact on confidentiality or integrity (C:N/I:N), but high impact on availability (A:H). The primary impact is the potential exhaustion of database storage due to the mass creation of unauthorized accounts, which could degrade or disrupt service availability. Additionally, the creation of non-requested storefront accounts on behalf of visitors could lead to administrative overhead and potential abuse scenarios. No patches or known exploits are currently documented, but the vulnerability is publicly disclosed and should be addressed promptly.
Potential Impact
The vulnerability allows attackers to create large numbers of unauthorized accounts without email confirmation, leading to potential database storage exhaustion and degraded service availability. This can cause denial-of-service conditions or increased operational costs due to resource consumption and account management overhead. While confidentiality and integrity are not directly impacted, the availability of the commerce platform could be significantly affected, disrupting business operations and customer experience. Organizations relying on Optimizely Configured Commerce for B2B storefronts may face service interruptions, increased support burden, and potential reputational damage if exploited. The lack of authentication and user interaction requirements lowers the barrier for exploitation, increasing the risk of automated abuse campaigns.
Mitigation Recommendations
Organizations should upgrade Optimizely Configured Commerce to version 5.2.2408 or later, where this issue is resolved. Until patching is possible, implement rate limiting and CAPTCHA challenges on account creation endpoints to mitigate automated mass account creation. Monitor account creation logs for unusual spikes or patterns indicative of abuse. Employ web application firewalls (WAFs) with rules targeting suspicious account creation behaviors. Review and tighten account verification processes, potentially adding manual or secondary verification steps. Regularly audit database storage and account inventories to detect and remove unauthorized or suspicious accounts. Coordinate with Optimizely support for any available interim fixes or guidance. Educate operational teams to recognize symptoms of exploitation and respond promptly.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-01-04T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6b1bb7ef31ef0b54e2f9
Added to database: 2/25/2026, 9:35:23 PM
Last enriched: 2/25/2026, 10:11:51 PM
Last updated: 2/26/2026, 10:44:23 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-64999: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Checkmk GmbH Checkmk
HighCVE-2026-28138: Deserialization of Untrusted Data in Stylemix uListing
HighCVE-2026-28136: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in VeronaLabs WP SMS
HighCVE-2026-28132: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in villatheme WooCommerce Photo Reviews
HighCVE-2026-28131: Insertion of Sensitive Information Into Sent Data in WPVibes Elementor Addon Elements
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.