CVE-2025-22385: CWE-862 Missing Authorization
An issue was discovered in Optimizely Configured Commerce before 5.2.2408. For newly created accounts, the Commerce B2B application does not require email confirmation. This medium-severity issue allows the mass creation of accounts. This could affect database storage; also, non-requested storefront accounts can be created on behalf of visitors.
AI Analysis
Technical Summary
CVE-2025-22385 is a vulnerability identified in Optimizely Configured Commerce prior to version 5.2.2408, specifically affecting the B2B application component. The root cause is a missing authorization control related to the account creation process: newly created accounts do not require email confirmation. This absence of verification enables attackers to automate the mass creation of accounts without any user consent or interaction. The vulnerability is classified under CWE-862 (Missing Authorization), indicating that the system fails to properly restrict access or actions to authorized users. The vulnerability's CVSS v3.1 base score is 5.9, reflecting a medium severity level, with vector metrics indicating network attack vector (AV:N), high attack complexity (AC:H), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no impact on confidentiality or integrity (C:N/I:N), but high impact on availability (A:H). The primary impact is the potential exhaustion of database storage due to the mass creation of unauthorized accounts, which could degrade or disrupt service availability. Additionally, the creation of non-requested storefront accounts on behalf of visitors could lead to administrative overhead and potential abuse scenarios. No patches or known exploits are currently documented, but the vulnerability is publicly disclosed and should be addressed promptly.
Potential Impact
The vulnerability allows attackers to create large numbers of unauthorized accounts without email confirmation, leading to potential database storage exhaustion and degraded service availability. This can cause denial-of-service conditions or increased operational costs due to resource consumption and account management overhead. While confidentiality and integrity are not directly impacted, the availability of the commerce platform could be significantly affected, disrupting business operations and customer experience. Organizations relying on Optimizely Configured Commerce for B2B storefronts may face service interruptions, increased support burden, and potential reputational damage if exploited. The lack of authentication and user interaction requirements lowers the barrier for exploitation, increasing the risk of automated abuse campaigns.
Mitigation Recommendations
Organizations should upgrade Optimizely Configured Commerce to version 5.2.2408 or later, where this issue is resolved. Until patching is possible, implement rate limiting and CAPTCHA challenges on account creation endpoints to mitigate automated mass account creation. Monitor account creation logs for unusual spikes or patterns indicative of abuse. Employ web application firewalls (WAFs) with rules targeting suspicious account creation behaviors. Review and tighten account verification processes, potentially adding manual or secondary verification steps. Regularly audit database storage and account inventories to detect and remove unauthorized or suspicious accounts. Coordinate with Optimizely support for any available interim fixes or guidance. Educate operational teams to recognize symptoms of exploitation and respond promptly.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, Japan, Sweden, Singapore
CVE-2025-22385: CWE-862 Missing Authorization
Description
An issue was discovered in Optimizely Configured Commerce before 5.2.2408. For newly created accounts, the Commerce B2B application does not require email confirmation. This medium-severity issue allows the mass creation of accounts. This could affect database storage; also, non-requested storefront accounts can be created on behalf of visitors.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-22385 is a vulnerability identified in Optimizely Configured Commerce prior to version 5.2.2408, specifically affecting the B2B application component. The root cause is a missing authorization control related to the account creation process: newly created accounts do not require email confirmation. This absence of verification enables attackers to automate the mass creation of accounts without any user consent or interaction. The vulnerability is classified under CWE-862 (Missing Authorization), indicating that the system fails to properly restrict access or actions to authorized users. The vulnerability's CVSS v3.1 base score is 5.9, reflecting a medium severity level, with vector metrics indicating network attack vector (AV:N), high attack complexity (AC:H), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no impact on confidentiality or integrity (C:N/I:N), but high impact on availability (A:H). The primary impact is the potential exhaustion of database storage due to the mass creation of unauthorized accounts, which could degrade or disrupt service availability. Additionally, the creation of non-requested storefront accounts on behalf of visitors could lead to administrative overhead and potential abuse scenarios. No patches or known exploits are currently documented, but the vulnerability is publicly disclosed and should be addressed promptly.
Potential Impact
The vulnerability allows attackers to create large numbers of unauthorized accounts without email confirmation, leading to potential database storage exhaustion and degraded service availability. This can cause denial-of-service conditions or increased operational costs due to resource consumption and account management overhead. While confidentiality and integrity are not directly impacted, the availability of the commerce platform could be significantly affected, disrupting business operations and customer experience. Organizations relying on Optimizely Configured Commerce for B2B storefronts may face service interruptions, increased support burden, and potential reputational damage if exploited. The lack of authentication and user interaction requirements lowers the barrier for exploitation, increasing the risk of automated abuse campaigns.
Mitigation Recommendations
Organizations should upgrade Optimizely Configured Commerce to version 5.2.2408 or later, where this issue is resolved. Until patching is possible, implement rate limiting and CAPTCHA challenges on account creation endpoints to mitigate automated mass account creation. Monitor account creation logs for unusual spikes or patterns indicative of abuse. Employ web application firewalls (WAFs) with rules targeting suspicious account creation behaviors. Review and tighten account verification processes, potentially adding manual or secondary verification steps. Regularly audit database storage and account inventories to detect and remove unauthorized or suspicious accounts. Coordinate with Optimizely support for any available interim fixes or guidance. Educate operational teams to recognize symptoms of exploitation and respond promptly.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-01-04T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6b1bb7ef31ef0b54e2f9
Added to database: 2/25/2026, 9:35:23 PM
Last enriched: 2/25/2026, 10:11:51 PM
Last updated: 4/12/2026, 5:06:09 PM
Views: 29
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.