CVE-2025-22386
Published: 04 January 2025
Summary
CVE-2025-22386 is a high-severity Insufficient Session Expiration (CWE-613) vulnerability in Optimizely Configured Commerce. Its CVSS base score is 7.3 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Web Session Cookie (T1550.004); ranked at the 41.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-12 (Session Termination) and AU-14 (Session Audit).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly requires automatic termination of user sessions upon logout or organization-defined inactivity periods, preventing reuse of tokens from logged-out sessions.
Mandates management of authenticators including periodic refresh, revocation, and protection, addressing prolonged validity of session tokens post-logout.
Provides audit capability for session events, enabling detection of unauthorized access or activity using improperly persistent session tokens.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Insufficient session expiration allows reuse of valid session tokens (web cookies) to impersonate users and bypass authentication controls.
NVD Description
An issue was discovered in Optimizely Configured Commerce before 5.2.2408. A medium-severity session issue exists in the Commerce B2B application, affecting the longevity of active sessions in the storefront. This allows session tokens tied to logged-out sessions to still be…
more
active and usable.
Deeper analysisAI
CVE-2025-22386 is a session management vulnerability discovered in Optimizely Configured Commerce versions prior to 5.2.2408, specifically impacting the Commerce B2B application's storefront. The issue involves insufficient session expiration (CWE-613), where session tokens tied to logged-out sessions remain active and usable beyond their intended lifespan. It carries a CVSS v3.1 base score of 7.3 (AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N), indicating medium-high severity due to network accessibility and potential for significant data exposure or manipulation.
The vulnerability can be exploited by an attacker with low privileges (PR:L) over the network (AV:N) with low attack complexity (AC:L), though it requires user interaction (UI:R). By obtaining a session token from a logged-out session—potentially through prior access or interception—the attacker can reuse it to impersonate the user, achieving high impacts on confidentiality (C:H) and integrity (I:H) without affecting availability (A:N). This enables unauthorized access to or modification of sensitive storefront data.
Optimizely has published security advisory COM-2024-04 at https://support.optimizely.com/hc/en-us/articles/32695284701069-Configured-Commerce-Security-Advisory-COM-2024-04, which details the vulnerability and mitigation steps. Practitioners should upgrade to Optimizely Configured Commerce 5.2.2408 or later to address the session longevity issue.
Details
- CWE(s)