CVE-2025-22387: CWE-598 Use of GET Request Method With Sensitive Query Strings
An issue was discovered in Optimizely Configured Commerce before 5.2.2408. A medium-severity issue exists in requests for resources where the session token is submitted as a URL parameter. This exposes information about the authenticated session, which can be leveraged for session hijacking.
AI Analysis
Technical Summary
CVE-2025-22387 is a vulnerability classified under CWE-598, which concerns the use of HTTP GET request methods with sensitive query strings. Specifically, in Optimizely Configured Commerce versions prior to 5.2.2408, session tokens are transmitted as URL parameters in GET requests. This insecure design flaw leads to exposure of authenticated session tokens in URLs, which can be logged in browser history, web server logs, proxy logs, or intercepted by network sniffers. Because session tokens are critical for maintaining authenticated user sessions, their exposure allows attackers to hijack active sessions without needing credentials or user interaction. The vulnerability is remotely exploitable over the network without privileges or authentication, increasing its risk profile. The CVSS 3.1 score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) indicates high confidentiality impact with no impact on integrity or availability. No patches or exploits are currently documented, but the issue is publicly known since January 2025. The root cause is the insecure practice of embedding sensitive tokens in URLs rather than using secure HTTP headers or cookies. This vulnerability highlights the importance of secure session management and avoiding sensitive data in URLs.
Potential Impact
The primary impact of this vulnerability is the compromise of confidentiality through session hijacking. Attackers who obtain the session token can impersonate legitimate users, potentially gaining unauthorized access to sensitive business data, customer information, or administrative functions within Optimizely Configured Commerce platforms. This can lead to data breaches, fraud, and loss of customer trust. Since the vulnerability does not affect integrity or availability directly, the main risk is unauthorized data access. The ease of exploitation (no authentication or user interaction required) and the wide network attack vector increase the likelihood of exploitation once discovered. Organizations relying on affected versions face increased risk of account takeover and subsequent downstream attacks. The exposure of session tokens in URLs also increases the risk from insider threats or compromised network infrastructure. Given Optimizely's use in e-commerce and digital experience management, the impact on business operations and reputation can be significant.
Mitigation Recommendations
1. Upgrade Optimizely Configured Commerce to version 5.2.2408 or later where this vulnerability is addressed. 2. Immediately audit all web application code and configurations to ensure session tokens or other sensitive authentication data are never included in URL query parameters. 3. Implement secure session management practices by using HTTP-only, Secure, and SameSite cookies to store session tokens instead of URL parameters. 4. Review and sanitize web server and proxy logs to remove any stored session tokens that may have been logged. 5. Enforce HTTPS across all communications to prevent interception of tokens in transit. 6. Educate developers and security teams about the risks of sensitive data in URLs and promote secure coding standards. 7. Monitor network traffic and logs for unusual access patterns that may indicate session hijacking attempts. 8. Consider implementing additional session security controls such as IP binding, user-agent validation, and short session expiration times to reduce the window of exploitation. 9. Conduct penetration testing and vulnerability assessments focused on session management to detect similar issues proactively.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, Sweden, Japan, South Korea
CVE-2025-22387: CWE-598 Use of GET Request Method With Sensitive Query Strings
Description
An issue was discovered in Optimizely Configured Commerce before 5.2.2408. A medium-severity issue exists in requests for resources where the session token is submitted as a URL parameter. This exposes information about the authenticated session, which can be leveraged for session hijacking.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-22387 is a vulnerability classified under CWE-598, which concerns the use of HTTP GET request methods with sensitive query strings. Specifically, in Optimizely Configured Commerce versions prior to 5.2.2408, session tokens are transmitted as URL parameters in GET requests. This insecure design flaw leads to exposure of authenticated session tokens in URLs, which can be logged in browser history, web server logs, proxy logs, or intercepted by network sniffers. Because session tokens are critical for maintaining authenticated user sessions, their exposure allows attackers to hijack active sessions without needing credentials or user interaction. The vulnerability is remotely exploitable over the network without privileges or authentication, increasing its risk profile. The CVSS 3.1 score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) indicates high confidentiality impact with no impact on integrity or availability. No patches or exploits are currently documented, but the issue is publicly known since January 2025. The root cause is the insecure practice of embedding sensitive tokens in URLs rather than using secure HTTP headers or cookies. This vulnerability highlights the importance of secure session management and avoiding sensitive data in URLs.
Potential Impact
The primary impact of this vulnerability is the compromise of confidentiality through session hijacking. Attackers who obtain the session token can impersonate legitimate users, potentially gaining unauthorized access to sensitive business data, customer information, or administrative functions within Optimizely Configured Commerce platforms. This can lead to data breaches, fraud, and loss of customer trust. Since the vulnerability does not affect integrity or availability directly, the main risk is unauthorized data access. The ease of exploitation (no authentication or user interaction required) and the wide network attack vector increase the likelihood of exploitation once discovered. Organizations relying on affected versions face increased risk of account takeover and subsequent downstream attacks. The exposure of session tokens in URLs also increases the risk from insider threats or compromised network infrastructure. Given Optimizely's use in e-commerce and digital experience management, the impact on business operations and reputation can be significant.
Mitigation Recommendations
1. Upgrade Optimizely Configured Commerce to version 5.2.2408 or later where this vulnerability is addressed. 2. Immediately audit all web application code and configurations to ensure session tokens or other sensitive authentication data are never included in URL query parameters. 3. Implement secure session management practices by using HTTP-only, Secure, and SameSite cookies to store session tokens instead of URL parameters. 4. Review and sanitize web server and proxy logs to remove any stored session tokens that may have been logged. 5. Enforce HTTPS across all communications to prevent interception of tokens in transit. 6. Educate developers and security teams about the risks of sensitive data in URLs and promote secure coding standards. 7. Monitor network traffic and logs for unusual access patterns that may indicate session hijacking attempts. 8. Consider implementing additional session security controls such as IP binding, user-agent validation, and short session expiration times to reduce the window of exploitation. 9. Conduct penetration testing and vulnerability assessments focused on session management to detect similar issues proactively.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-01-04T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6b1bb7ef31ef0b54e2ff
Added to database: 2/25/2026, 9:35:23 PM
Last enriched: 2/25/2026, 10:12:28 PM
Last updated: 4/12/2026, 12:21:43 AM
Views: 67
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.