CVE-2025-10930: CWE-352 Cross-Site Request Forgery (CSRF) in Drupal Currency
Cross-Site Request Forgery (CSRF) vulnerability in Drupal Currency allows Cross Site Request Forgery.This issue affects Currency: from 0.0.0 before 3.5.0.
AI Analysis
Technical Summary
CVE-2025-10930 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the Drupal Currency module, affecting all versions prior to 3.5.0. CSRF vulnerabilities allow attackers to induce authenticated users to submit unwanted requests to a web application in which they are currently authenticated, potentially leading to unauthorized state-changing actions. In this case, the Currency module lacks sufficient anti-CSRF protections, such as CSRF tokens or proper validation of request origins, enabling attackers to craft malicious web pages or links that, when visited by a logged-in user, execute unintended actions on the Drupal site. The vulnerability was reserved on September 24, 2025, and published on October 29, 2025. No CVSS score has been assigned yet, and no known exploits have been reported in the wild. The affected versions include all releases before 3.5.0, indicating that the issue is resolved in 3.5.0 or later. The vulnerability impacts the integrity of the Drupal site by allowing unauthorized commands to be executed under the context of an authenticated user, potentially modifying currency settings or other sensitive configurations. Since Drupal is widely used across Europe for government, education, and enterprise websites, this vulnerability could be leveraged to disrupt services or manipulate financial data displayed or processed by the Currency module. The lack of a patch link suggests that users should monitor official Drupal security advisories for updates. The vulnerability requires the victim to be authenticated but does not require additional user interaction beyond visiting a malicious page, making it relatively easy to exploit in targeted phishing or watering hole attacks.
Potential Impact
For European organizations, the impact of CVE-2025-10930 can be significant, especially for those relying on Drupal-based websites that use the Currency module for financial or transactional data display and processing. Successful exploitation could lead to unauthorized changes in currency configurations, potentially causing incorrect financial information to be displayed or processed, damaging organizational credibility and trust. This could also facilitate further attacks by altering site behavior or injecting malicious content. Public sector websites, financial institutions, e-commerce platforms, and educational institutions in Europe that use Drupal are particularly at risk. The integrity of web applications is compromised, and while confidentiality and availability impacts are limited, the trustworthiness and correctness of financial data could be undermined. Additionally, attackers could leverage this vulnerability as part of a broader attack chain to escalate privileges or conduct fraud. The absence of known exploits currently reduces immediate risk but does not eliminate the threat, especially as exploit code could emerge rapidly after public disclosure. The vulnerability's ease of exploitation and the widespread use of Drupal in Europe increase the urgency for mitigation.
Mitigation Recommendations
European organizations should take the following specific actions to mitigate CVE-2025-10930: 1) Immediately audit Drupal installations to identify the presence and version of the Currency module. 2) Upgrade the Currency module to version 3.5.0 or later as soon as the patch is officially released. 3) In the interim, implement strict anti-CSRF protections by enforcing CSRF tokens on all state-changing requests within the Currency module, if feasible. 4) Employ Content Security Policy (CSP) headers to restrict the domains from which scripts and forms can be loaded, reducing the risk of malicious request injection. 5) Educate users and administrators about phishing and social engineering risks that could facilitate CSRF attacks. 6) Monitor web server and application logs for unusual POST requests or changes to currency-related settings. 7) Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block suspicious CSRF attack patterns targeting Drupal endpoints. 8) Regularly review and update Drupal core and contributed modules to minimize exposure to known vulnerabilities. These steps go beyond generic advice by focusing on module-specific upgrades, configuration hardening, and proactive monitoring tailored to the Currency module's context.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Belgium, Italy, Spain
CVE-2025-10930: CWE-352 Cross-Site Request Forgery (CSRF) in Drupal Currency
Description
Cross-Site Request Forgery (CSRF) vulnerability in Drupal Currency allows Cross Site Request Forgery.This issue affects Currency: from 0.0.0 before 3.5.0.
AI-Powered Analysis
Technical Analysis
CVE-2025-10930 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the Drupal Currency module, affecting all versions prior to 3.5.0. CSRF vulnerabilities allow attackers to induce authenticated users to submit unwanted requests to a web application in which they are currently authenticated, potentially leading to unauthorized state-changing actions. In this case, the Currency module lacks sufficient anti-CSRF protections, such as CSRF tokens or proper validation of request origins, enabling attackers to craft malicious web pages or links that, when visited by a logged-in user, execute unintended actions on the Drupal site. The vulnerability was reserved on September 24, 2025, and published on October 29, 2025. No CVSS score has been assigned yet, and no known exploits have been reported in the wild. The affected versions include all releases before 3.5.0, indicating that the issue is resolved in 3.5.0 or later. The vulnerability impacts the integrity of the Drupal site by allowing unauthorized commands to be executed under the context of an authenticated user, potentially modifying currency settings or other sensitive configurations. Since Drupal is widely used across Europe for government, education, and enterprise websites, this vulnerability could be leveraged to disrupt services or manipulate financial data displayed or processed by the Currency module. The lack of a patch link suggests that users should monitor official Drupal security advisories for updates. The vulnerability requires the victim to be authenticated but does not require additional user interaction beyond visiting a malicious page, making it relatively easy to exploit in targeted phishing or watering hole attacks.
Potential Impact
For European organizations, the impact of CVE-2025-10930 can be significant, especially for those relying on Drupal-based websites that use the Currency module for financial or transactional data display and processing. Successful exploitation could lead to unauthorized changes in currency configurations, potentially causing incorrect financial information to be displayed or processed, damaging organizational credibility and trust. This could also facilitate further attacks by altering site behavior or injecting malicious content. Public sector websites, financial institutions, e-commerce platforms, and educational institutions in Europe that use Drupal are particularly at risk. The integrity of web applications is compromised, and while confidentiality and availability impacts are limited, the trustworthiness and correctness of financial data could be undermined. Additionally, attackers could leverage this vulnerability as part of a broader attack chain to escalate privileges or conduct fraud. The absence of known exploits currently reduces immediate risk but does not eliminate the threat, especially as exploit code could emerge rapidly after public disclosure. The vulnerability's ease of exploitation and the widespread use of Drupal in Europe increase the urgency for mitigation.
Mitigation Recommendations
European organizations should take the following specific actions to mitigate CVE-2025-10930: 1) Immediately audit Drupal installations to identify the presence and version of the Currency module. 2) Upgrade the Currency module to version 3.5.0 or later as soon as the patch is officially released. 3) In the interim, implement strict anti-CSRF protections by enforcing CSRF tokens on all state-changing requests within the Currency module, if feasible. 4) Employ Content Security Policy (CSP) headers to restrict the domains from which scripts and forms can be loaded, reducing the risk of malicious request injection. 5) Educate users and administrators about phishing and social engineering risks that could facilitate CSRF attacks. 6) Monitor web server and application logs for unusual POST requests or changes to currency-related settings. 7) Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block suspicious CSRF attack patterns targeting Drupal endpoints. 8) Regularly review and update Drupal core and contributed modules to minimize exposure to known vulnerabilities. These steps go beyond generic advice by focusing on module-specific upgrades, configuration hardening, and proactive monitoring tailored to the Currency module's context.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- drupal
- Date Reserved
- 2025-09-24T16:53:14.378Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6902a10ed6627ef5904a7ab5
Added to database: 10/29/2025, 11:19:42 PM
Last enriched: 10/29/2025, 11:36:00 PM
Last updated: 10/30/2025, 2:21:33 PM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-43941: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Dell Unity
HighX-Request-Purpose: Identifying "research" and bug bounty related scans?, (Thu, Oct 30th)
MediumCVE-2025-10348: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Eveo URVE Smart Office
MediumMillions Impacted by Conduent Data Breach
MediumCVE-2025-63608: n/a
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.