NetSuite vulnerability could leave thousands of websites exposed
The issue stems from a misconfiguration of access controls in NetSuite's SuiteCommerce instances


Researchers have warned of a new vulnerability in NetSuite’s SuiteCommerce tool that could expose sensitive data.
Stemming from misconfigured access controls, the vulnerability leaves sensitive personally identifiable information (PII) exposed, including the full addresses and mobile phone numbers of customers
The vulnerability has already left several thousand live SuiteCommerce websites vulnerable and the extent of potential damage could be far-reaching.
"NetSuite is one of the world’s leading enterprise resource planning (ERP) systems and handles business critical data for thousands of organizations,” AppOmni researcher Aaron Costello told ITPro.
“My research found that thousands of these organizations are leaking sensitive customer data to the public through misconfigurations in their access controls. The sheer scale at which I found these exposures to be occurring is significant,” he added.
Costello noted that the issue can be attributed to “the way that access controls are configured in SuiteCommerce instances.”
These access controls are misconfigured more specifically in custom record types (CRTs), a form of table created by enterprises who use the SuiteCommerce platform.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Using a test environment to create a proof of concept (PoC) for the attack vector, Costello outlined how it would be possible for a malicious actor to exfiltrate data as an unauthenticated user.
Assuming an attacker knows the name of the CRT - which can be done through observation of HTTP traffic or brute-forcing the API endpoint - they can then obtain record identifications within the same CRT.
Once they have the record IDs, the attacker can read the data with “load record” by sending a request to the “Burp Intruder tab.” They could also read specific fields using “search record” functions.
NetSuite does not provide “readily available transaction logs” though, according to the report. Such logs could be useful in determining the malicious use of the client-side APIs deployed on this attack vector.
RELATED WHITEPAPER
“If you suspect that your organization may have been the victim of an attack that resembles a pattern similar to what was discussed in this blog post, we recommend contacting NetSuite support and requesting the raw log data,” Costello advised.
To mitigate against future risk, administrators need to tighten up access controls on CRTs, as well as convert sensitive fields to “None” for public access so that information is not as vulnerable.
Admins should also consider taking impacted sites offline, at least for the time being, so as to prevent the exposure of data any further.
“Many organizations are struggling to implement and maintain a robust SaaS security program,” Costello said.
“Through research like this, AppOmni strives to educate and equip organizations so that they may be better prepared to identify and tackle both known and unknown risks to their SaaS applications,” he added.

George Fitzmaurice is a former Staff Writer at ITPro and ChannelPro, with a particular interest in AI regulation, data legislation, and market development. After graduating from the University of Oxford with a degree in English Language and Literature, he undertook an internship at the New Statesman before starting at ITPro. Outside of the office, George is both an aspiring musician and an avid reader.
-
Bigger salaries, more burnout: Is the CISO role in crisis?
In-depth CISOs are more stressed than ever before – but why is this and what can be done?
By Kate O'Flaherty Published
-
Cheap cyber crime kits can be bought on the dark web for less than $25
News Research from NordVPN shows phishing kits are now widely available on the dark web and via messaging apps like Telegram, and are often selling for less than $25.
By Emma Woollacott Published
-
Oracle breach claims spark war of words with security researchers
News A war of words has erupted between Oracle and cybersecurity researchers following claims the company suffered a security breach.
By Ross Kelly Published
-
“By this time next year, Oracle employees won't be using passwords” — Larry Ellison wants a biometric future in cybersecurity
News The Oracle CTO hit out at passwords, calling them insecure and easy to steal
By George Fitzmaurice Published
-
Oracle's massive advertising database operates without user consent, lawsuit claims
News Rights organisers have accused Oracle of collecting an undue level of sensitive data to identify consumers online
By Rory Bathgate Published
-
Oracle joins Cloudflare's Bandwidth Alliance
News Database giant will adjust cloud transfer fees for Cloudflare customers
By Danny Bradbury Published
-
Oracle won't let you turn off security ever again
News Larry Ellison: It was a mistake to let customers manage security features
By Joe Curtis Published
-
Two more zero-day Java bugs discovered
News Polish researchers find more flaws in Java 7 browser plug-in.
By Rene Millman Published
-
Microsoft warns users to be wary of fake Java updates
News Cybercriminals set malware trap for users worried by Java zero-day exploits.
By Jane McCallion Published
-
Calls for Java overhaul grow as more security flaws emerge
News Security experts suggest problems in the development cycle of Java could be to blame for recent security woes.
By Caroline Donnelly Published