Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13081: CWE-915 Improperly Controlled Modification of Dynamically-Determined Object Attributes in Drupal Drupal core

0
Medium
VulnerabilityCVE-2025-13081cvecve-2025-13081cwe-915
Published: Tue Nov 18 2025 (11/18/2025, 16:54:56 UTC)
Source: CVE Database V5
Vendor/Project: Drupal
Product: Drupal core

Description

Improperly Controlled Modification of Dynamically-Determined Object Attributes vulnerability in Drupal Drupal core allows Object Injection.This issue affects Drupal core: from 8.0.0 before 10.4.9, from 10.5.0 before 10.5.6, from 11.0.0 before 11.1.9, from 11.2.0 before 11.2.8.

AI-Powered Analysis

AILast updated: 11/25/2025, 17:12:38 UTC

Technical Analysis

CVE-2025-13081 is a vulnerability in Drupal core characterized by improper control over the modification of dynamically-determined object attributes, classified under CWE-915 (Improperly Controlled Modification of Dynamically-Determined Object Attributes) and CWE-502 (Object Injection). This flaw allows an attacker with high privileges to perform Object Injection attacks by manipulating object attributes dynamically, potentially leading to unauthorized disclosure or modification of sensitive data within the Drupal environment. The vulnerability affects multiple major Drupal core versions: from 8.0.0 before 10.4.9, from 10.5.0 before 10.5.6, from 11.0.0 before 11.1.9, and from 11.2.0 before 11.2.8. The attack vector is network-based (AV:N), but exploitation requires high privileges (PR:H) and has high attack complexity (AC:H), with no user interaction needed (UI:N). The impact primarily affects confidentiality and integrity, with no direct impact on availability. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk to Drupal installations that have not been patched. The lack of patch links in the provided data suggests that organizations should monitor official Drupal advisories closely for updates. Given Drupal's widespread use in web content management, especially in government and enterprise sectors, this vulnerability could be leveraged to compromise sensitive information or alter content integrity if exploited.

Potential Impact

For European organizations, the impact of CVE-2025-13081 can be substantial, particularly for those relying on Drupal core for their web presence, intranet portals, or digital services. The vulnerability allows attackers with high privileges to inject malicious objects, potentially leading to unauthorized access to confidential data, data tampering, or privilege escalation within the Drupal environment. This can result in data breaches, loss of trust, regulatory non-compliance (e.g., GDPR violations), and disruption of business operations. Since the vulnerability does not affect availability, denial-of-service is less of a concern; however, the compromise of data confidentiality and integrity can have severe reputational and financial consequences. European public sector entities, educational institutions, and enterprises using Drupal are at risk, especially if internal access controls are weak or if privileged accounts are compromised. The requirement for high privileges limits the attack surface but also highlights the importance of securing administrative access and monitoring privileged user activities.

Mitigation Recommendations

1. Immediately upgrade Drupal core to the fixed versions: 10.4.9 or later, 10.5.6 or later, 11.1.9 or later, and 11.2.8 or later as applicable. 2. Review and minimize the number of users with high privileges to reduce the risk of exploitation. 3. Implement strict access controls and multi-factor authentication (MFA) for administrative accounts to prevent unauthorized privilege escalation. 4. Conduct thorough audits of object attribute handling in custom Drupal modules or third-party extensions to identify and remediate similar injection risks. 5. Monitor Drupal logs and system activity for unusual behavior indicative of object injection attempts or privilege misuse. 6. Employ web application firewalls (WAFs) with rules tailored to detect and block suspicious object manipulation patterns. 7. Stay informed through official Drupal security advisories and community channels for any emerging exploit information or patches. 8. Consider deploying runtime application self-protection (RASP) solutions to detect and prevent exploitation attempts in real-time.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
drupal
Date Reserved
2025-11-12T18:26:37.184Z
Cvss Version
null
State
PUBLISHED

Threat ID: 691ca514209f2030fafbb901

Added to database: 11/18/2025, 4:55:48 PM

Last enriched: 11/25/2025, 5:12:38 PM

Last updated: 1/7/2026, 8:50:12 AM

Views: 91

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats