Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10930: CWE-352 Cross-Site Request Forgery (CSRF) in Drupal Currency

0
Medium
VulnerabilityCVE-2025-10930cvecve-2025-10930cwe-352
Published: Wed Oct 29 2025 (10/29/2025, 23:13:54 UTC)
Source: CVE Database V5
Vendor/Project: Drupal
Product: Currency

Description

Cross-Site Request Forgery (CSRF) vulnerability in Drupal Currency allows Cross Site Request Forgery.This issue affects Currency: from 0.0.0 before 3.5.0.

AI-Powered Analysis

AILast updated: 10/29/2025, 23:36:00 UTC

Technical Analysis

CVE-2025-10930 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the Drupal Currency module, affecting all versions prior to 3.5.0. CSRF vulnerabilities allow attackers to induce authenticated users to submit unwanted requests to a web application in which they are currently authenticated, potentially leading to unauthorized state-changing actions. In this case, the Currency module lacks sufficient anti-CSRF protections, such as CSRF tokens or proper validation of request origins, enabling attackers to craft malicious web pages or links that, when visited by a logged-in user, execute unintended actions on the Drupal site. The vulnerability was reserved on September 24, 2025, and published on October 29, 2025. No CVSS score has been assigned yet, and no known exploits have been reported in the wild. The affected versions include all releases before 3.5.0, indicating that the issue is resolved in 3.5.0 or later. The vulnerability impacts the integrity of the Drupal site by allowing unauthorized commands to be executed under the context of an authenticated user, potentially modifying currency settings or other sensitive configurations. Since Drupal is widely used across Europe for government, education, and enterprise websites, this vulnerability could be leveraged to disrupt services or manipulate financial data displayed or processed by the Currency module. The lack of a patch link suggests that users should monitor official Drupal security advisories for updates. The vulnerability requires the victim to be authenticated but does not require additional user interaction beyond visiting a malicious page, making it relatively easy to exploit in targeted phishing or watering hole attacks.

Potential Impact

For European organizations, the impact of CVE-2025-10930 can be significant, especially for those relying on Drupal-based websites that use the Currency module for financial or transactional data display and processing. Successful exploitation could lead to unauthorized changes in currency configurations, potentially causing incorrect financial information to be displayed or processed, damaging organizational credibility and trust. This could also facilitate further attacks by altering site behavior or injecting malicious content. Public sector websites, financial institutions, e-commerce platforms, and educational institutions in Europe that use Drupal are particularly at risk. The integrity of web applications is compromised, and while confidentiality and availability impacts are limited, the trustworthiness and correctness of financial data could be undermined. Additionally, attackers could leverage this vulnerability as part of a broader attack chain to escalate privileges or conduct fraud. The absence of known exploits currently reduces immediate risk but does not eliminate the threat, especially as exploit code could emerge rapidly after public disclosure. The vulnerability's ease of exploitation and the widespread use of Drupal in Europe increase the urgency for mitigation.

Mitigation Recommendations

European organizations should take the following specific actions to mitigate CVE-2025-10930: 1) Immediately audit Drupal installations to identify the presence and version of the Currency module. 2) Upgrade the Currency module to version 3.5.0 or later as soon as the patch is officially released. 3) In the interim, implement strict anti-CSRF protections by enforcing CSRF tokens on all state-changing requests within the Currency module, if feasible. 4) Employ Content Security Policy (CSP) headers to restrict the domains from which scripts and forms can be loaded, reducing the risk of malicious request injection. 5) Educate users and administrators about phishing and social engineering risks that could facilitate CSRF attacks. 6) Monitor web server and application logs for unusual POST requests or changes to currency-related settings. 7) Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block suspicious CSRF attack patterns targeting Drupal endpoints. 8) Regularly review and update Drupal core and contributed modules to minimize exposure to known vulnerabilities. These steps go beyond generic advice by focusing on module-specific upgrades, configuration hardening, and proactive monitoring tailored to the Currency module's context.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
drupal
Date Reserved
2025-09-24T16:53:14.378Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6902a10ed6627ef5904a7ab5

Added to database: 10/29/2025, 11:19:42 PM

Last enriched: 10/29/2025, 11:36:00 PM

Last updated: 10/30/2025, 2:21:33 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats