Vulnerabilities

nopCommerce Vulnerability Lets Attackers Access Application Using Captured Cookie

A critical flaw in the popular open-source eCommerce platform nopCommerce exposes users to session hijacking attacks.

Security researchers at CERT have issued Vulnerability Note VU#633103, detailing how the platform fails to invalidate session cookies after logout or session termination.

Tracked as CVE-2025-11699, this issue affects versions 4.70 and earlier, plus 4.80.3 specifically.

Attackers can replay stolen cookies to access admin endpoints, even after logout. The vulnerability surfaced publicly on December 1, 2025, via a Full Disclosure post and GitHub issue #7044 in the nopCommerce repository.

nopCommerce powers online stores for major brands like Microsoft, Volvo, and BMW.

Built on ASP.NET Core with MS SQL Server 2012 backend, it integrates shipping APIs, CDNs, and user login for cart persistence.

The core problem lies in session management: upon logout, the server does not clear or regenerate the session cookie (typically named .Nop.Customer).

This cookie, which authenticates requests, remains valid indefinitely if captured via cross-site scripting (XSS), network sniffing (e.g., unencrypted Wi-Fi), or local device compromise.

Technical Breakdown

In a typical ASP.NET Core session flow, logout should trigger the HttpContext.SignOutAsync() to revoke tokens and invalidate cookies via HttpOnly, Secure, and SameSite flags.

nopCommerce skips this for its custom session cookie, echoing a prior flaw CVE-2019-7215.

An attacker with a valid cookie say, from an XSS payload document. Cookie exfiltration or MITM via tools like Wireshark can inject it into their browser via developer tools or Burp Suite repeater.

Proof-of-concept exploits confirm access to privileged routes. For instance, after a legitimate logout, replaying the cookie to POST /admin/common/save notification bypasses auth checks, as the backend trusts the unaltered session ID tied to the MS SQL session store.

This persists across browser restarts if not browser-cleared, amplifying risks in shared or compromised environments. Underground markets already trade such session data for ransomware entry or crypto theft, per CERT analysis.

Impact and Mitigation

Impacts range from account takeover to full store compromise, enabling fraudulent orders, data exfiltration, or ransomware deployment.

ECommerce sites face heightened financial risks, especially when integrated payment gateways are used.

The fix rolled out in nopCommerce versions 4.70 and later (excluding 4.80.3).

Administrators on vulnerable releases must upgrade immediately to 4.90.3, which enforces proper cookie invalidation via enhanced SignOut logic.

Interim mitigations include enforcing HTTPS, HttpOnly flags, and short session timeouts.

nopSolutions acknowledged the report by Beatriz Fresno Naumova (beafn28), documented by CERT’s Christopher Cullen.

Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies..

Recent Posts

Burp Suite Supercharges Its Scanning Capabilities With React2Shell Vulnerability Detection

PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…

4 months ago

Malicious MCP Servers Enable New Prompt Injection Attack To Drain Resources

Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…

4 months ago

Law Enforcement Detains Hackers Equipped With Specialized Flipper Hacking Tools

Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…

4 months ago

Google Unveils 10 New Gemini-Powered AI Features For Chrome

Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…

4 months ago

CISA Alerts On Actively Exploited Buffer Overflow Flaw In D-Link Routers

Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…

4 months ago

Over 500 Apache Tika Toolkit Instances Exposed To Critical XXE Vulnerability

Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…

4 months ago