CVE-2025-13083: CWE-525 Use of Web Browser Cache Containing Sensitive Information in Drupal Drupal core
Use of Web Browser Cache Containing Sensitive Information vulnerability in Drupal Drupal core allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Drupal core: from 8.0.0 before 10.4.9, from 10.5.0 before 10.5.6, from 11.0.0 before 11.1.9, from 11.2.0 before 11.2.8, from 7.0 before 7.103.
AI Analysis
Technical Summary
CVE-2025-13083 is a vulnerability classified under CWE-525, concerning the use of web browser cache containing sensitive information in Drupal core. This issue arises from incorrectly configured access control security levels that allow sensitive data to be cached by the user's web browser. Affected versions include Drupal core from 7.0 before 7.103, 8.0.0 before 10.4.9, 10.5.0 before 10.5.6, 11.0.0 before 11.1.9, and 11.2.0 before 11.2.8. The vulnerability does not require user interaction or privileges but has a high attack complexity, meaning exploitation is not straightforward. The impact is limited to confidentiality, as attackers could potentially retrieve sensitive information from the browser cache if they gain access to the victim's device or browser data. There are no known exploits in the wild at the time of publication. The vulnerability is mitigated by proper configuration of cache-control headers and access control settings within Drupal to prevent sensitive content from being cached by browsers. Since Drupal is widely used for content management across many sectors, improper caching could expose sensitive user or organizational data if left unpatched.
Potential Impact
For European organizations, the primary impact of CVE-2025-13083 is the potential unauthorized disclosure of sensitive information through browser cache leakage. This could include session tokens, personal data, or confidential content accessible via cached pages. While the vulnerability does not allow direct system compromise or data manipulation, the confidentiality breach could facilitate further attacks such as session hijacking or identity theft. Organizations in sectors handling sensitive personal data (e.g., government, healthcare, finance) are particularly at risk. The impact is mitigated by the high attack complexity and the requirement for physical or remote access to the victim's browser cache, limiting large-scale exploitation. However, organizations with remote or shared work environments should be cautious, as cached data on shared devices could be accessed by unauthorized users. Failure to address this vulnerability could lead to reputational damage and non-compliance with data protection regulations like GDPR if personal data is exposed.
Mitigation Recommendations
1. Immediately update Drupal core to the latest patched versions: 7.103, 10.4.9 or later, 10.5.6 or later, 11.1.9 or later, and 11.2.8 or later. 2. Review and enforce strict cache-control headers (e.g., 'Cache-Control: no-store, no-cache, must-revalidate') on pages serving sensitive information to prevent browser caching. 3. Audit and correct access control configurations within Drupal to ensure sensitive content is not accessible without proper authorization. 4. Educate users and administrators about the risks of browser caching sensitive data, especially on shared or public devices. 5. Implement browser security policies such as Content Security Policy (CSP) and HTTP Strict Transport Security (HSTS) to reduce attack surface. 6. Regularly monitor and audit web server and application logs for unusual access patterns that might indicate attempts to exploit cached data. 7. Consider deploying endpoint security solutions that protect browser cache data on user devices, especially in high-risk environments. 8. Conduct periodic security assessments and penetration testing focusing on cache-related vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2025-13083: CWE-525 Use of Web Browser Cache Containing Sensitive Information in Drupal Drupal core
Description
Use of Web Browser Cache Containing Sensitive Information vulnerability in Drupal Drupal core allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Drupal core: from 8.0.0 before 10.4.9, from 10.5.0 before 10.5.6, from 11.0.0 before 11.1.9, from 11.2.0 before 11.2.8, from 7.0 before 7.103.
AI-Powered Analysis
Technical Analysis
CVE-2025-13083 is a vulnerability classified under CWE-525, concerning the use of web browser cache containing sensitive information in Drupal core. This issue arises from incorrectly configured access control security levels that allow sensitive data to be cached by the user's web browser. Affected versions include Drupal core from 7.0 before 7.103, 8.0.0 before 10.4.9, 10.5.0 before 10.5.6, 11.0.0 before 11.1.9, and 11.2.0 before 11.2.8. The vulnerability does not require user interaction or privileges but has a high attack complexity, meaning exploitation is not straightforward. The impact is limited to confidentiality, as attackers could potentially retrieve sensitive information from the browser cache if they gain access to the victim's device or browser data. There are no known exploits in the wild at the time of publication. The vulnerability is mitigated by proper configuration of cache-control headers and access control settings within Drupal to prevent sensitive content from being cached by browsers. Since Drupal is widely used for content management across many sectors, improper caching could expose sensitive user or organizational data if left unpatched.
Potential Impact
For European organizations, the primary impact of CVE-2025-13083 is the potential unauthorized disclosure of sensitive information through browser cache leakage. This could include session tokens, personal data, or confidential content accessible via cached pages. While the vulnerability does not allow direct system compromise or data manipulation, the confidentiality breach could facilitate further attacks such as session hijacking or identity theft. Organizations in sectors handling sensitive personal data (e.g., government, healthcare, finance) are particularly at risk. The impact is mitigated by the high attack complexity and the requirement for physical or remote access to the victim's browser cache, limiting large-scale exploitation. However, organizations with remote or shared work environments should be cautious, as cached data on shared devices could be accessed by unauthorized users. Failure to address this vulnerability could lead to reputational damage and non-compliance with data protection regulations like GDPR if personal data is exposed.
Mitigation Recommendations
1. Immediately update Drupal core to the latest patched versions: 7.103, 10.4.9 or later, 10.5.6 or later, 11.1.9 or later, and 11.2.8 or later. 2. Review and enforce strict cache-control headers (e.g., 'Cache-Control: no-store, no-cache, must-revalidate') on pages serving sensitive information to prevent browser caching. 3. Audit and correct access control configurations within Drupal to ensure sensitive content is not accessible without proper authorization. 4. Educate users and administrators about the risks of browser caching sensitive data, especially on shared or public devices. 5. Implement browser security policies such as Content Security Policy (CSP) and HTTP Strict Transport Security (HSTS) to reduce attack surface. 6. Regularly monitor and audit web server and application logs for unusual access patterns that might indicate attempts to exploit cached data. 7. Consider deploying endpoint security solutions that protect browser cache data on user devices, especially in high-risk environments. 8. Conduct periodic security assessments and penetration testing focusing on cache-related vulnerabilities.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- drupal
- Date Reserved
- 2025-11-12T18:26:39.713Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 691ca896209f2030fa0168df
Added to database: 11/18/2025, 5:10:46 PM
Last enriched: 1/8/2026, 6:34:53 PM
Last updated: 1/9/2026, 9:02:56 AM
Views: 34
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0627: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in mohammed_kaludi AMP for WP – Accelerated Mobile Pages
MediumCVE-2025-69195: Stack-based Buffer Overflow
HighCVE-2025-69194: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
HighCVE-2024-8300: CWE-561 Dead Code in Mitsubishi Electric Corporation GENESIS64
HighCVE-2024-8299: CWE-427 Uncontrolled Search Path Element in Mitsubishi Electric Corporation GENESIS64
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.