Skip to content

Commit ca0df9a

Browse files
author
cvelistV5 Github Action
committed
5 changes (0 new | 5 updated):
- 0 new CVEs: - 5 updated CVEs: CVE-2025-22386, CVE-2025-22387, CVE-2025-22388, CVE-2025-22389, CVE-2025-22390
1 parent 80f0ec4 commit ca0df9a

File tree

7 files changed

+167
-127
lines changed

7 files changed

+167
-127
lines changed

cves/2025/22xxx/CVE-2025-22386.json

Lines changed: 24 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -5,51 +5,55 @@
55
"cveId": "CVE-2025-22386",
66
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
77
"assignerShortName": "mitre",
8-
"dateUpdated": "2025-01-04T01:46:52.528994",
8+
"dateUpdated": "2025-01-04T02:04:58.516Z",
99
"dateReserved": "2025-01-04T00:00:00",
1010
"datePublished": "2025-01-04T00:00:00"
1111
},
1212
"containers": {
1313
"cna": {
14-
"providerMetadata": {
15-
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
16-
"shortName": "mitre",
17-
"dateUpdated": "2025-01-04T01:46:52.528994"
18-
},
19-
"descriptions": [
20-
{
21-
"lang": "en",
22-
"value": "An issue was discovered in Optimizely Configured Commerce before 5.2.2408. A medium-severity session issue exists in the Commerce B2B application, affecting the longevity of active sessions in the storefront. This allows session tokens tied to logged-out sessions to still be active and usable."
23-
}
24-
],
2514
"affected": [
2615
{
27-
"vendor": "n/a",
2816
"product": "n/a",
17+
"vendor": "n/a",
2918
"versions": [
3019
{
31-
"version": "n/a",
32-
"status": "affected"
20+
"status": "affected",
21+
"version": "n/a"
3322
}
3423
]
3524
}
3625
],
37-
"references": [
26+
"descriptions": [
3827
{
39-
"url": "https://support.optimizely.com/hc/en-us/articles/32695284701069-Configured-Commerce-Security-Advisory-COM-2024-04"
28+
"lang": "en",
29+
"value": "An issue was discovered in Optimizely Configured Commerce before 5.2.2408. A medium-severity session issue exists in the Commerce B2B application, affecting the longevity of active sessions in the storefront. This allows session tokens tied to logged-out sessions to still be active and usable."
4030
}
4131
],
4232
"problemTypes": [
4333
{
4434
"descriptions": [
4535
{
46-
"type": "text",
36+
"cweId": "CWE-613",
37+
"description": "CWE-613 Insufficient Session Expiration",
4738
"lang": "en",
48-
"description": "n/a"
39+
"type": "CWE"
4940
}
5041
]
5142
}
52-
]
43+
],
44+
"providerMetadata": {
45+
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
46+
"shortName": "mitre",
47+
"dateUpdated": "2025-01-04T02:04:58.516Z"
48+
},
49+
"references": [
50+
{
51+
"url": "https://support.optimizely.com/hc/en-us/articles/32695284701069-Configured-Commerce-Security-Advisory-COM-2024-04"
52+
}
53+
],
54+
"x_generator": {
55+
"engine": "enrichogram 0.0.1"
56+
}
5357
}
5458
},
5559
"dataVersion": "5.1"

cves/2025/22xxx/CVE-2025-22387.json

Lines changed: 24 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -5,51 +5,55 @@
55
"cveId": "CVE-2025-22387",
66
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
77
"assignerShortName": "mitre",
8-
"dateUpdated": "2025-01-04T01:46:42.749365",
8+
"dateUpdated": "2025-01-04T02:06:18.617Z",
99
"dateReserved": "2025-01-04T00:00:00",
1010
"datePublished": "2025-01-04T00:00:00"
1111
},
1212
"containers": {
1313
"cna": {
14-
"providerMetadata": {
15-
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
16-
"shortName": "mitre",
17-
"dateUpdated": "2025-01-04T01:46:42.749365"
18-
},
19-
"descriptions": [
20-
{
21-
"lang": "en",
22-
"value": "An issue was discovered in Optimizely Configured Commerce before 5.2.2408. A medium-severity issue exists in requests for resources where the session token is submitted as a URL parameter. This exposes information about the authenticated session, which can be leveraged for session hijacking."
23-
}
24-
],
2514
"affected": [
2615
{
27-
"vendor": "n/a",
2816
"product": "n/a",
17+
"vendor": "n/a",
2918
"versions": [
3019
{
31-
"version": "n/a",
32-
"status": "affected"
20+
"status": "affected",
21+
"version": "n/a"
3322
}
3423
]
3524
}
3625
],
37-
"references": [
26+
"descriptions": [
3827
{
39-
"url": "https://support.optimizely.com/hc/en-us/articles/32695551034893-Configured-Commerce-Security-Advisory-COM-2024-06"
28+
"lang": "en",
29+
"value": "An issue was discovered in Optimizely Configured Commerce before 5.2.2408. A medium-severity issue exists in requests for resources where the session token is submitted as a URL parameter. This exposes information about the authenticated session, which can be leveraged for session hijacking."
4030
}
4131
],
4232
"problemTypes": [
4333
{
4434
"descriptions": [
4535
{
46-
"type": "text",
36+
"cweId": "CWE-598",
37+
"description": "CWE-598 Use of GET Request Method With Sensitive Query Strings",
4738
"lang": "en",
48-
"description": "n/a"
39+
"type": "CWE"
4940
}
5041
]
5142
}
52-
]
43+
],
44+
"providerMetadata": {
45+
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
46+
"shortName": "mitre",
47+
"dateUpdated": "2025-01-04T02:06:18.617Z"
48+
},
49+
"references": [
50+
{
51+
"url": "https://support.optimizely.com/hc/en-us/articles/32695551034893-Configured-Commerce-Security-Advisory-COM-2024-06"
52+
}
53+
],
54+
"x_generator": {
55+
"engine": "enrichogram 0.0.1"
56+
}
5357
}
5458
},
5559
"dataVersion": "5.1"

cves/2025/22xxx/CVE-2025-22388.json

Lines changed: 24 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -5,51 +5,55 @@
55
"cveId": "CVE-2025-22388",
66
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
77
"assignerShortName": "mitre",
8-
"dateUpdated": "2025-01-04T01:46:34.387692",
8+
"dateUpdated": "2025-01-04T02:06:49.019Z",
99
"dateReserved": "2025-01-04T00:00:00",
1010
"datePublished": "2025-01-04T00:00:00"
1111
},
1212
"containers": {
1313
"cna": {
14-
"providerMetadata": {
15-
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
16-
"shortName": "mitre",
17-
"dateUpdated": "2025-01-04T01:46:34.387692"
18-
},
19-
"descriptions": [
20-
{
21-
"lang": "en",
22-
"value": "An issue was discovered in Optimizely EPiServer.CMS.Core before 12.22.0. A high-severity Stored Cross-Site Scripting (XSS) vulnerability exists in the CMS, allowing malicious actors to inject and execute arbitrary JavaScript code, potentially compromising user data, escalating privileges, or executing unauthorized actions. The issue exists in multiple areas, including content editing, link management, and file uploads."
23-
}
24-
],
2514
"affected": [
2615
{
27-
"vendor": "n/a",
2816
"product": "n/a",
17+
"vendor": "n/a",
2918
"versions": [
3019
{
31-
"version": "n/a",
32-
"status": "affected"
20+
"status": "affected",
21+
"version": "n/a"
3322
}
3423
]
3524
}
3625
],
37-
"references": [
26+
"descriptions": [
3827
{
39-
"url": "https://support.optimizely.com/hc/en-us/articles/33182047260557-Content-Management-System-CMS-Security-Advisory-CMS-2025-01"
28+
"lang": "en",
29+
"value": "An issue was discovered in Optimizely EPiServer.CMS.Core before 12.22.0. A high-severity Stored Cross-Site Scripting (XSS) vulnerability exists in the CMS, allowing malicious actors to inject and execute arbitrary JavaScript code, potentially compromising user data, escalating privileges, or executing unauthorized actions. The issue exists in multiple areas, including content editing, link management, and file uploads."
4030
}
4131
],
4232
"problemTypes": [
4333
{
4434
"descriptions": [
4535
{
46-
"type": "text",
36+
"cweId": "CWE-79",
37+
"description": "CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')",
4738
"lang": "en",
48-
"description": "n/a"
39+
"type": "CWE"
4940
}
5041
]
5142
}
52-
]
43+
],
44+
"providerMetadata": {
45+
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
46+
"shortName": "mitre",
47+
"dateUpdated": "2025-01-04T02:06:49.019Z"
48+
},
49+
"references": [
50+
{
51+
"url": "https://support.optimizely.com/hc/en-us/articles/33182047260557-Content-Management-System-CMS-Security-Advisory-CMS-2025-01"
52+
}
53+
],
54+
"x_generator": {
55+
"engine": "enrichogram 0.0.1"
56+
}
5357
}
5458
},
5559
"dataVersion": "5.1"

cves/2025/22xxx/CVE-2025-22389.json

Lines changed: 24 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -5,51 +5,55 @@
55
"cveId": "CVE-2025-22389",
66
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
77
"assignerShortName": "mitre",
8-
"dateUpdated": "2025-01-04T01:46:25.289704",
8+
"dateUpdated": "2025-01-04T02:09:16.461Z",
99
"dateReserved": "2025-01-04T00:00:00",
1010
"datePublished": "2025-01-04T00:00:00"
1111
},
1212
"containers": {
1313
"cna": {
14-
"providerMetadata": {
15-
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
16-
"shortName": "mitre",
17-
"dateUpdated": "2025-01-04T01:46:25.289704"
18-
},
19-
"descriptions": [
20-
{
21-
"lang": "en",
22-
"value": "An issue was discovered in Optimizely EPiServer.CMS.Core before 12.32.0. A medium-severity vulnerability exists in the CMS, where the application does not properly validate uploaded files. This allows the upload of potentially malicious file types, including .docm .html. When accessed by application users, these files can be used to execute malicious actions or compromise users' systems."
23-
}
24-
],
2514
"affected": [
2615
{
27-
"vendor": "n/a",
2816
"product": "n/a",
17+
"vendor": "n/a",
2918
"versions": [
3019
{
31-
"version": "n/a",
32-
"status": "affected"
20+
"status": "affected",
21+
"version": "n/a"
3322
}
3423
]
3524
}
3625
],
37-
"references": [
26+
"descriptions": [
3827
{
39-
"url": "https://support.optimizely.com/hc/en-us/articles/33182404079629-Content-Management-System-CMS-Security-Advisory-CMS-2025-03"
28+
"lang": "en",
29+
"value": "An issue was discovered in Optimizely EPiServer.CMS.Core before 12.32.0. A medium-severity vulnerability exists in the CMS, where the application does not properly validate uploaded files. This allows the upload of potentially malicious file types, including .docm .html. When accessed by application users, these files can be used to execute malicious actions or compromise users' systems."
4030
}
4131
],
4232
"problemTypes": [
4333
{
4434
"descriptions": [
4535
{
46-
"type": "text",
36+
"cweId": "CWE-434",
37+
"description": "CWE-434 Unrestricted Upload of File with Dangerous Type",
4738
"lang": "en",
48-
"description": "n/a"
39+
"type": "CWE"
4940
}
5041
]
5142
}
52-
]
43+
],
44+
"providerMetadata": {
45+
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
46+
"shortName": "mitre",
47+
"dateUpdated": "2025-01-04T02:09:16.461Z"
48+
},
49+
"references": [
50+
{
51+
"url": "https://support.optimizely.com/hc/en-us/articles/33182404079629-Content-Management-System-CMS-Security-Advisory-CMS-2025-03"
52+
}
53+
],
54+
"x_generator": {
55+
"engine": "enrichogram 0.0.1"
56+
}
5357
}
5458
},
5559
"dataVersion": "5.1"

cves/2025/22xxx/CVE-2025-22390.json

Lines changed: 24 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -5,51 +5,55 @@
55
"cveId": "CVE-2025-22390",
66
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
77
"assignerShortName": "mitre",
8-
"dateUpdated": "2025-01-04T01:46:15.654346",
8+
"dateUpdated": "2025-01-04T02:11:01.919Z",
99
"dateReserved": "2025-01-04T00:00:00",
1010
"datePublished": "2025-01-04T00:00:00"
1111
},
1212
"containers": {
1313
"cna": {
14-
"providerMetadata": {
15-
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
16-
"shortName": "mitre",
17-
"dateUpdated": "2025-01-04T01:46:15.654346"
18-
},
19-
"descriptions": [
20-
{
21-
"lang": "en",
22-
"value": "An issue was discovered in Optimizely EPiServer.CMS.Core before 12.32.0. A medium-severity vulnerability exists in the CMS due to insufficient enforcement of password complexity requirements. The application permits users to set passwords with a minimum length of 6 characters, lacking adequate complexity to resist modern attack techniques such as password spraying or offline password cracking."
23-
}
24-
],
2514
"affected": [
2615
{
27-
"vendor": "n/a",
2816
"product": "n/a",
17+
"vendor": "n/a",
2918
"versions": [
3019
{
31-
"version": "n/a",
32-
"status": "affected"
20+
"status": "affected",
21+
"version": "n/a"
3322
}
3423
]
3524
}
3625
],
37-
"references": [
26+
"descriptions": [
3827
{
39-
"url": "https://support.optimizely.com/hc/en-us/articles/33182255281293-Content-Management-System-CMS-Security-Advisory-CMS-2025-02"
28+
"lang": "en",
29+
"value": "An issue was discovered in Optimizely EPiServer.CMS.Core before 12.32.0. A medium-severity vulnerability exists in the CMS due to insufficient enforcement of password complexity requirements. The application permits users to set passwords with a minimum length of 6 characters, lacking adequate complexity to resist modern attack techniques such as password spraying or offline password cracking."
4030
}
4131
],
4232
"problemTypes": [
4333
{
4434
"descriptions": [
4535
{
46-
"type": "text",
36+
"cweId": "CWE-521",
37+
"description": "CWE-521 Weak Password Requirements",
4738
"lang": "en",
48-
"description": "n/a"
39+
"type": "CWE"
4940
}
5041
]
5142
}
52-
]
43+
],
44+
"providerMetadata": {
45+
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
46+
"shortName": "mitre",
47+
"dateUpdated": "2025-01-04T02:11:01.919Z"
48+
},
49+
"references": [
50+
{
51+
"url": "https://support.optimizely.com/hc/en-us/articles/33182255281293-Content-Management-System-CMS-Security-Advisory-CMS-2025-02"
52+
}
53+
],
54+
"x_generator": {
55+
"engine": "enrichogram 0.0.1"
56+
}
5357
}
5458
},
5559
"dataVersion": "5.1"

0 commit comments

Comments
 (0)