Vulnerability Description
A race condition vulnerability exists in MedusaJS Medusa v2.12.2 and earlier in the registerUsage() function of the promotion module. The function performs a non-atomic read-check-update operation when enforcing promotion usage limits. This allows unauthenticated remote attackers to bypass usage limits by sending concurrent checkout requests, resulting in unlimited redemptions of limited-use promotional codes and potential financial loss.
CVSS Score
HIGH
Related Weaknesses (CWE)
References
- https://github.com/EthanKim88/ethan-cve-disclosures/blob/main/CVE-2025-69871-Med
- https://github.com/medusajs/medusa
- https://github.com/medusajs/medusa/pull/13760
FAQ
What is CVE-2025-69871?
CVE-2025-69871 is a vulnerability with a CVSS score of 8.1 (HIGH). A race condition vulnerability exists in MedusaJS Medusa v2.12.2 and earlier in the registerUsage() function of the promotion module. The function performs a non-atomic read-check-update operation whe...
How severe is CVE-2025-69871?
CVE-2025-69871 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-69871?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.