CVE-2025-22384

7.5 HIGH

📋 TL;DR

This vulnerability allows attackers to purchase discontinued products by manipulating requests before they reach the server. It affects Optimizely Configured Commerce B2B storefronts running versions before 5.2.2408. The issue stems from improper validation of business logic in the commerce application.

💻 Affected Systems

Products:
  • Optimizely Configured Commerce
Versions: All versions before 5.2.2408
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects B2B storefront configurations; requires discontinued products to be present in the catalog.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could purchase discontinued inventory at potentially discounted prices, causing inventory management issues and financial loss.

🟠

Likely Case

Limited abuse of discontinued product purchases, potentially disrupting inventory accuracy and business operations.

🟢

If Mitigated

Minimal impact with proper input validation and business logic controls in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires manipulation of client-side requests before server processing; likely involves intercepting/modifying HTTP requests.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.2.2408 or later

Vendor Advisory: https://support.optimizely.com/hc/en-us/articles/32694560473741-Configured-Commerce-Security-Advisory-COM-2024-02

Restart Required: No

Instructions:

1. Upgrade Optimizely Configured Commerce to version 5.2.2408 or later. 2. Apply the update through your deployment pipeline. 3. Verify the fix by testing discontinued product purchase attempts.

🔧 Temporary Workarounds

Enhanced Input Validation

all

Implement server-side validation for all product purchase requests to ensure discontinued products cannot be ordered.

Business Logic Controls

all

Add additional checks in the order processing workflow to validate product status before completing transactions.

🧯 If You Can't Patch

  • Implement WAF rules to detect and block suspicious purchase request patterns
  • Monitor order logs for purchases of discontinued products and implement manual review processes

🔍 How to Verify

Check if Vulnerable:

Check if your Configured Commerce version is below 5.2.2408 in the admin panel or deployment configuration.

Check Version:

Check admin panel or deployment configuration for version number

Verify Fix Applied:

After patching, attempt to purchase a discontinued product through normal and manipulated requests to confirm the fix.

📡 Detection & Monitoring

Log Indicators:

  • Unusual purchase patterns for discontinued products
  • Multiple failed purchase attempts followed by successful ones

Network Indicators:

  • Modified HTTP requests to purchase endpoints
  • Unusual timing between request submission and processing

SIEM Query:

source="commerce_logs" AND (product_status="discontinued" AND action="purchase")

🔗 References

📤 Share & Export