Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10930: CWE-352 Cross-Site Request Forgery (CSRF) in Drupal Currency

0
Medium
VulnerabilityCVE-2025-10930cvecve-2025-10930cwe-352
Published: Wed Oct 29 2025 (10/29/2025, 23:13:54 UTC)
Source: CVE Database V5
Vendor/Project: Drupal
Product: Currency

Description

Cross-Site Request Forgery (CSRF) vulnerability in Drupal Currency allows Cross Site Request Forgery.This issue affects Currency: from 0.0.0 before 3.5.0.

AI-Powered Analysis

AILast updated: 11/06/2025, 02:21:20 UTC

Technical Analysis

CVE-2025-10930 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the Drupal Currency module, specifically affecting all versions prior to 3.5.0. CSRF vulnerabilities occur when a web application does not properly verify that requests modifying state originate from legitimate users, allowing attackers to craft malicious web pages or links that cause authenticated users to unknowingly perform actions on the vulnerable site. In this case, the Drupal Currency module fails to implement adequate CSRF protections, such as anti-CSRF tokens or same-site request validation, enabling attackers to execute unauthorized state-changing requests. The vulnerability has a CVSS v3.1 base score of 6.5, reflecting medium severity, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction needed (UI:N), unchanged scope (S:U), no confidentiality impact (C:N), low integrity impact (I:L), and low availability impact (A:L). This means an attacker can remotely exploit the vulnerability without authentication or user interaction to cause limited integrity and availability impacts, such as unauthorized configuration changes or service disruptions. Although no public exploits are currently known, the vulnerability is publicly disclosed and should be treated as a credible risk. The Drupal Currency module is commonly used in Drupal-based websites to handle currency-related functions, often in e-commerce or financial contexts, increasing the potential impact of unauthorized changes. The vulnerability was reserved in late September 2025 and published in late October 2025, indicating recent discovery and disclosure. No official patches or exploit mitigations are linked yet, emphasizing the need for proactive defensive measures.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to websites and services using the Drupal Currency module, especially those involved in e-commerce, financial transactions, or currency conversions. Exploitation could lead to unauthorized changes in currency settings, pricing, or financial data, potentially causing financial discrepancies, customer trust erosion, or service disruptions. The integrity and availability of affected web applications could be compromised, leading to operational impacts and reputational damage. Since the vulnerability requires no authentication or user interaction, attackers can remotely target vulnerable sites at scale. European organizations operating in regulated sectors such as finance, retail, or public services may face compliance risks if unauthorized changes lead to data inaccuracies or service outages. Additionally, the disruption of currency-related functions could affect cross-border transactions and financial reporting, which are critical in the European single market. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers often develop exploits following public disclosure. Therefore, European entities should consider this vulnerability a significant risk to their web infrastructure and customer-facing services.

Mitigation Recommendations

To mitigate CVE-2025-10930, European organizations should immediately update the Drupal Currency module to version 3.5.0 or later once available, as this version addresses the CSRF vulnerability. Until patches are applied, implement strict anti-CSRF protections by ensuring that all state-changing requests include validated CSRF tokens and that the application enforces same-site cookie policies to limit cross-origin requests. Review and restrict permissions so that only trusted and authenticated users can perform sensitive currency-related operations. Employ web application firewalls (WAFs) with rules designed to detect and block CSRF attack patterns targeting Drupal modules. Conduct thorough security audits and penetration tests focusing on CSRF vectors within Drupal sites. Educate developers and administrators about secure coding practices related to CSRF prevention. Monitor web server logs for unusual or suspicious request patterns that may indicate exploitation attempts. Finally, maintain an incident response plan to quickly address any detected exploitation or service impact.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
drupal
Date Reserved
2025-09-24T16:53:14.378Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6902a10ed6627ef5904a7ab5

Added to database: 10/29/2025, 11:19:42 PM

Last enriched: 11/6/2025, 2:21:20 AM

Last updated: 12/14/2025, 8:20:57 AM

Views: 70

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats