Description

A newly disclosed vulnerability CVE-2025-11699 in nopCommerce, a widely used open-source ecommerce platform supporting major global brands such as Microsoft, Volvo, and BMW, exposes online stores to severe session hijacking risks due to nopCommerce’s failure to invalidate session cookies upon logout, enabling attackers to reuse stolen session tokens to access user or administrator accounts long after the legitimate session has ended. Because the platform powers full retail environments from storefronts to payment flows, the risk extends to sensitive data, backend systems, and financial operations. When a user logs out, their session cookie should immediately become invalid. CERT/CC reports that nopCommerce versions 4.70 and earlier, as well as version 4.80.3, do not invalidate these cookies, leaving them active indefinitely, allowing an attacker to obtain session token through XSS, network sniffing, local compromise, or malware to bypass authentication and access privileged features like /admin panel, allowing manipulating orders, alter store configurations, exfiltrate customer data, or install malicious code, also large-scale fraud and ransomware. Such tokens become highly useful to attackers who sell stolen tokens or use them in broader criminal campaigns. CERT/CC notes that comparable vulnerabilities, including CVE-2019-7215, have historically enabled ransomware operators and cryptocurrency thieves to pivot deeper into corporate systems. A stolen administrator cookie could facilitate direct financial theft, unauthorized system changes, or even complete takeover of the ecommerce platform. To address the risk, administrators are urged to immediately upgrade to nopCommerce 4.90.3, which contains the required fixes. Any version above 4.70 except 4.80.3 is considered safe. Until patched, organizations should enforce secure session handling practices, monitor for suspicious logins to privileged endpoints, enable HTTPS everywhere, rotate session secrets, and review logs for reused or long-lived session tokens. Strengthening XSS defenses, securing networks against interception, and implementing MFA for administrative accounts further reduces the impact of potential session hijacking attempts.