Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-22385: CWE-862 Missing Authorization

0
Medium
VulnerabilityCVE-2025-22385cvecve-2025-22385cwe-862
Published: Sat Jan 04 2025 (01/04/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2025-22385 is a medium-severity vulnerability in Optimizely Configured Commerce versions before 5. 2. 2408. The issue arises because newly created B2B accounts do not require email confirmation, allowing attackers to mass-create accounts without user consent. This missing authorization flaw (CWE-862) can lead to database storage exhaustion and unauthorized account creation on behalf of visitors. Exploitation requires no authentication or user interaction but has a high attack complexity. No known exploits are currently reported in the wild. Organizations using affected versions should prioritize patching to prevent potential abuse and resource exhaustion.

AI-Powered Analysis

AILast updated: 02/25/2026, 22:11:51 UTC

Technical Analysis

CVE-2025-22385 is a vulnerability identified in Optimizely Configured Commerce prior to version 5.2.2408, specifically affecting the B2B application component. The root cause is a missing authorization control related to the account creation process: newly created accounts do not require email confirmation. This absence of verification enables attackers to automate the mass creation of accounts without any user consent or interaction. The vulnerability is classified under CWE-862 (Missing Authorization), indicating that the system fails to properly restrict access or actions to authorized users. The vulnerability's CVSS v3.1 base score is 5.9, reflecting a medium severity level, with vector metrics indicating network attack vector (AV:N), high attack complexity (AC:H), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no impact on confidentiality or integrity (C:N/I:N), but high impact on availability (A:H). The primary impact is the potential exhaustion of database storage due to the mass creation of unauthorized accounts, which could degrade or disrupt service availability. Additionally, the creation of non-requested storefront accounts on behalf of visitors could lead to administrative overhead and potential abuse scenarios. No patches or known exploits are currently documented, but the vulnerability is publicly disclosed and should be addressed promptly.

Potential Impact

The vulnerability allows attackers to create large numbers of unauthorized accounts without email confirmation, leading to potential database storage exhaustion and degraded service availability. This can cause denial-of-service conditions or increased operational costs due to resource consumption and account management overhead. While confidentiality and integrity are not directly impacted, the availability of the commerce platform could be significantly affected, disrupting business operations and customer experience. Organizations relying on Optimizely Configured Commerce for B2B storefronts may face service interruptions, increased support burden, and potential reputational damage if exploited. The lack of authentication and user interaction requirements lowers the barrier for exploitation, increasing the risk of automated abuse campaigns.

Mitigation Recommendations

Organizations should upgrade Optimizely Configured Commerce to version 5.2.2408 or later, where this issue is resolved. Until patching is possible, implement rate limiting and CAPTCHA challenges on account creation endpoints to mitigate automated mass account creation. Monitor account creation logs for unusual spikes or patterns indicative of abuse. Employ web application firewalls (WAFs) with rules targeting suspicious account creation behaviors. Review and tighten account verification processes, potentially adding manual or secondary verification steps. Regularly audit database storage and account inventories to detect and remove unauthorized or suspicious accounts. Coordinate with Optimizely support for any available interim fixes or guidance. Educate operational teams to recognize symptoms of exploitation and respond promptly.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-01-04T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6b1bb7ef31ef0b54e2f9

Added to database: 2/25/2026, 9:35:23 PM

Last enriched: 2/25/2026, 10:11:51 PM

Last updated: 2/26/2026, 10:44:23 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats