CVE-2025-10930: CWE-352 Cross-Site Request Forgery (CSRF) in Drupal Currency
Cross-Site Request Forgery (CSRF) vulnerability in Drupal Currency allows Cross Site Request Forgery.This issue affects Currency: from 0.0.0 before 3.5.0.
AI Analysis
Technical Summary
CVE-2025-10930 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the Drupal Currency module, specifically affecting all versions prior to 3.5.0. CSRF vulnerabilities occur when a web application does not properly verify that requests modifying state originate from legitimate users, allowing attackers to craft malicious web pages or links that cause authenticated users to unknowingly perform actions on the vulnerable site. In this case, the Drupal Currency module fails to implement adequate CSRF protections, such as anti-CSRF tokens or same-site request validation, enabling attackers to execute unauthorized state-changing requests. The vulnerability has a CVSS v3.1 base score of 6.5, reflecting medium severity, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction needed (UI:N), unchanged scope (S:U), no confidentiality impact (C:N), low integrity impact (I:L), and low availability impact (A:L). This means an attacker can remotely exploit the vulnerability without authentication or user interaction to cause limited integrity and availability impacts, such as unauthorized configuration changes or service disruptions. Although no public exploits are currently known, the vulnerability is publicly disclosed and should be treated as a credible risk. The Drupal Currency module is commonly used in Drupal-based websites to handle currency-related functions, often in e-commerce or financial contexts, increasing the potential impact of unauthorized changes. The vulnerability was reserved in late September 2025 and published in late October 2025, indicating recent discovery and disclosure. No official patches or exploit mitigations are linked yet, emphasizing the need for proactive defensive measures.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to websites and services using the Drupal Currency module, especially those involved in e-commerce, financial transactions, or currency conversions. Exploitation could lead to unauthorized changes in currency settings, pricing, or financial data, potentially causing financial discrepancies, customer trust erosion, or service disruptions. The integrity and availability of affected web applications could be compromised, leading to operational impacts and reputational damage. Since the vulnerability requires no authentication or user interaction, attackers can remotely target vulnerable sites at scale. European organizations operating in regulated sectors such as finance, retail, or public services may face compliance risks if unauthorized changes lead to data inaccuracies or service outages. Additionally, the disruption of currency-related functions could affect cross-border transactions and financial reporting, which are critical in the European single market. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers often develop exploits following public disclosure. Therefore, European entities should consider this vulnerability a significant risk to their web infrastructure and customer-facing services.
Mitigation Recommendations
To mitigate CVE-2025-10930, European organizations should immediately update the Drupal Currency module to version 3.5.0 or later once available, as this version addresses the CSRF vulnerability. Until patches are applied, implement strict anti-CSRF protections by ensuring that all state-changing requests include validated CSRF tokens and that the application enforces same-site cookie policies to limit cross-origin requests. Review and restrict permissions so that only trusted and authenticated users can perform sensitive currency-related operations. Employ web application firewalls (WAFs) with rules designed to detect and block CSRF attack patterns targeting Drupal modules. Conduct thorough security audits and penetration tests focusing on CSRF vectors within Drupal sites. Educate developers and administrators about secure coding practices related to CSRF prevention. Monitor web server logs for unusual or suspicious request patterns that may indicate exploitation attempts. Finally, maintain an incident response plan to quickly address any detected exploitation or service impact.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Poland
CVE-2025-10930: CWE-352 Cross-Site Request Forgery (CSRF) in Drupal Currency
Description
Cross-Site Request Forgery (CSRF) vulnerability in Drupal Currency allows Cross Site Request Forgery.This issue affects Currency: from 0.0.0 before 3.5.0.
AI-Powered Analysis
Technical Analysis
CVE-2025-10930 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the Drupal Currency module, specifically affecting all versions prior to 3.5.0. CSRF vulnerabilities occur when a web application does not properly verify that requests modifying state originate from legitimate users, allowing attackers to craft malicious web pages or links that cause authenticated users to unknowingly perform actions on the vulnerable site. In this case, the Drupal Currency module fails to implement adequate CSRF protections, such as anti-CSRF tokens or same-site request validation, enabling attackers to execute unauthorized state-changing requests. The vulnerability has a CVSS v3.1 base score of 6.5, reflecting medium severity, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction needed (UI:N), unchanged scope (S:U), no confidentiality impact (C:N), low integrity impact (I:L), and low availability impact (A:L). This means an attacker can remotely exploit the vulnerability without authentication or user interaction to cause limited integrity and availability impacts, such as unauthorized configuration changes or service disruptions. Although no public exploits are currently known, the vulnerability is publicly disclosed and should be treated as a credible risk. The Drupal Currency module is commonly used in Drupal-based websites to handle currency-related functions, often in e-commerce or financial contexts, increasing the potential impact of unauthorized changes. The vulnerability was reserved in late September 2025 and published in late October 2025, indicating recent discovery and disclosure. No official patches or exploit mitigations are linked yet, emphasizing the need for proactive defensive measures.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to websites and services using the Drupal Currency module, especially those involved in e-commerce, financial transactions, or currency conversions. Exploitation could lead to unauthorized changes in currency settings, pricing, or financial data, potentially causing financial discrepancies, customer trust erosion, or service disruptions. The integrity and availability of affected web applications could be compromised, leading to operational impacts and reputational damage. Since the vulnerability requires no authentication or user interaction, attackers can remotely target vulnerable sites at scale. European organizations operating in regulated sectors such as finance, retail, or public services may face compliance risks if unauthorized changes lead to data inaccuracies or service outages. Additionally, the disruption of currency-related functions could affect cross-border transactions and financial reporting, which are critical in the European single market. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers often develop exploits following public disclosure. Therefore, European entities should consider this vulnerability a significant risk to their web infrastructure and customer-facing services.
Mitigation Recommendations
To mitigate CVE-2025-10930, European organizations should immediately update the Drupal Currency module to version 3.5.0 or later once available, as this version addresses the CSRF vulnerability. Until patches are applied, implement strict anti-CSRF protections by ensuring that all state-changing requests include validated CSRF tokens and that the application enforces same-site cookie policies to limit cross-origin requests. Review and restrict permissions so that only trusted and authenticated users can perform sensitive currency-related operations. Employ web application firewalls (WAFs) with rules designed to detect and block CSRF attack patterns targeting Drupal modules. Conduct thorough security audits and penetration tests focusing on CSRF vectors within Drupal sites. Educate developers and administrators about secure coding practices related to CSRF prevention. Monitor web server logs for unusual or suspicious request patterns that may indicate exploitation attempts. Finally, maintain an incident response plan to quickly address any detected exploitation or service impact.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- drupal
- Date Reserved
- 2025-09-24T16:53:14.378Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6902a10ed6627ef5904a7ab5
Added to database: 10/29/2025, 11:19:42 PM
Last enriched: 11/6/2025, 2:21:20 AM
Last updated: 12/14/2025, 8:20:57 AM
Views: 70
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14650: SQL Injection in itsourcecode Online Cake Ordering System
MediumCVE-2025-14649: SQL Injection in itsourcecode Online Cake Ordering System
MediumCVE-2025-14648: Command Injection in DedeBIZ
MediumCVE-2025-14647: SQL Injection in code-projects Computer Book Store
MediumCVE-2025-14646: SQL Injection in code-projects Student File Management System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.