CVE-2025-22386

7.3 HIGH

📋 TL;DR

This vulnerability allows session tokens from logged-out users to remain active and usable in Optimizely Configured Commerce B2B storefronts. Attackers could potentially hijack sessions and perform unauthorized actions. Organizations using affected versions of Configured Commerce are at risk.

💻 Affected Systems

Products:
  • Optimizely Configured Commerce
Versions: All versions before 5.2.2408
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Affects B2B storefront sessions specifically; all deployments with active sessions are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers hijack administrative sessions, gaining full control over the commerce platform to modify products, steal customer data, or disrupt operations.

🟠

Likely Case

Attackers hijack user sessions to make unauthorized purchases, access sensitive order history, or modify account details.

🟢

If Mitigated

With proper session management controls, impact is limited to temporary unauthorized access that is quickly detected and revoked.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires obtaining session tokens through other means (e.g., XSS, network sniffing) but exploitation is straightforward once tokens are acquired.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.2.2408 or later

Vendor Advisory: https://support.optimizely.com/hc/en-us/articles/32695284701069-Configured-Commerce-Security-Advisory-COM-2024-04

Restart Required: No

Instructions:

1. Upgrade Configured Commerce to version 5.2.2408 or later. 2. Apply the patch through your deployment pipeline. 3. Verify session management is functioning correctly post-upgrade.

🔧 Temporary Workarounds

Session Timeout Reduction

all

Reduce session timeout values to minimize window of opportunity for token reuse

Modify web.config or application settings to set lower session timeout values

Force Session Invalidation

all

Implement custom logout handlers that explicitly invalidate server-side session data

Add session.abandon() or equivalent in logout routines

🧯 If You Can't Patch

  • Implement additional session validation checks in application code
  • Deploy WAF rules to detect and block suspicious session activity

🔍 How to Verify

Check if Vulnerable:

Check if Configured Commerce version is below 5.2.2408 in admin panel or deployment manifest

Check Version:

Check application version in admin interface or deployment configuration files

Verify Fix Applied:

Test logout functionality: after logout, attempt to reuse session token - it should be rejected

📡 Detection & Monitoring

Log Indicators:

  • Multiple successful requests with same session ID after logout events
  • Session ID reuse from different IP addresses

Network Indicators:

  • Unusual session token reuse patterns
  • Requests with expired session tokens still being processed

SIEM Query:

session_id:* AND (event:logout OR status:401) AND later event:session_id:* AND status:200

🔗 References

📤 Share & Export