CVE-2025-13083: CWE-525 Use of Web Browser Cache Containing Sensitive Information in Drupal Drupal core
Use of Web Browser Cache Containing Sensitive Information vulnerability in Drupal Drupal core allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Drupal core: from 8.0.0 before 10.4.9, from 10.5.0 before 10.5.6, from 11.0.0 before 11.1.9, from 11.2.0 before 11.2.8.
AI Analysis
Technical Summary
CVE-2025-13083 is a security vulnerability identified in the Drupal core content management system affecting multiple versions starting from 8.0.0 through various 10.x and 11.x releases prior to specific patch versions. The issue stems from the improper handling of web browser cache, where sensitive information is stored and accessible due to incorrectly configured access control security levels within Drupal. This misconfiguration allows sensitive data, potentially including session tokens, user credentials, or other confidential information, to be cached by the browser and subsequently accessed by unauthorized users who can reach the victim's browser cache. The vulnerability is categorized under CWE-525, which relates to the use of web browser cache containing sensitive information. The CVSS v3.1 base score is 3.7 (low), with vector AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N, indicating that the attack can be performed remotely over the network without privileges or user interaction but requires high attack complexity. The vulnerability does not impact integrity or availability, only confidentiality. No known exploits have been reported in the wild as of the publication date. The vulnerability affects a broad range of Drupal core versions, highlighting the importance of updating to the fixed releases (10.4.9, 10.5.6, 11.1.9, 11.2.8 or later).
Potential Impact
For European organizations, the primary impact of CVE-2025-13083 is the potential leakage of sensitive information through the web browser cache. This can lead to unauthorized disclosure of confidential data, which may include user session information or other private content served by Drupal-based websites. While the vulnerability does not allow modification or disruption of services, the confidentiality breach could facilitate further attacks such as session hijacking or identity theft. Organizations operating public-facing Drupal websites, especially those handling personal data under GDPR, face compliance risks if sensitive data is exposed. The low CVSS score suggests limited direct damage, but the risk of data leakage remains a concern, particularly for sectors like government, finance, healthcare, and e-commerce where Drupal is widely used. The absence of known exploits reduces immediate threat levels, but proactive patching is essential to mitigate potential future exploitation.
Mitigation Recommendations
European organizations should immediately assess their Drupal core versions and upgrade to the patched releases: 10.4.9, 10.5.6, 11.1.9, 11.2.8, or later. Beyond patching, administrators should review and harden access control configurations to ensure sensitive data is not cached in browsers. Implement HTTP headers such as Cache-Control: no-store and Pragma: no-cache on sensitive pages to prevent caching of confidential information. Conduct regular security audits focusing on web application caching policies and session management. Employ Content Security Policy (CSP) to restrict resource loading and reduce attack surface. Educate developers and administrators about secure caching practices and monitor web traffic for unusual access patterns that may indicate attempts to exploit cached data. Finally, ensure compliance with GDPR data protection requirements by minimizing sensitive data exposure and documenting mitigation efforts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Belgium, Italy, Spain, Poland
CVE-2025-13083: CWE-525 Use of Web Browser Cache Containing Sensitive Information in Drupal Drupal core
Description
Use of Web Browser Cache Containing Sensitive Information vulnerability in Drupal Drupal core allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Drupal core: from 8.0.0 before 10.4.9, from 10.5.0 before 10.5.6, from 11.0.0 before 11.1.9, from 11.2.0 before 11.2.8.
AI-Powered Analysis
Technical Analysis
CVE-2025-13083 is a security vulnerability identified in the Drupal core content management system affecting multiple versions starting from 8.0.0 through various 10.x and 11.x releases prior to specific patch versions. The issue stems from the improper handling of web browser cache, where sensitive information is stored and accessible due to incorrectly configured access control security levels within Drupal. This misconfiguration allows sensitive data, potentially including session tokens, user credentials, or other confidential information, to be cached by the browser and subsequently accessed by unauthorized users who can reach the victim's browser cache. The vulnerability is categorized under CWE-525, which relates to the use of web browser cache containing sensitive information. The CVSS v3.1 base score is 3.7 (low), with vector AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N, indicating that the attack can be performed remotely over the network without privileges or user interaction but requires high attack complexity. The vulnerability does not impact integrity or availability, only confidentiality. No known exploits have been reported in the wild as of the publication date. The vulnerability affects a broad range of Drupal core versions, highlighting the importance of updating to the fixed releases (10.4.9, 10.5.6, 11.1.9, 11.2.8 or later).
Potential Impact
For European organizations, the primary impact of CVE-2025-13083 is the potential leakage of sensitive information through the web browser cache. This can lead to unauthorized disclosure of confidential data, which may include user session information or other private content served by Drupal-based websites. While the vulnerability does not allow modification or disruption of services, the confidentiality breach could facilitate further attacks such as session hijacking or identity theft. Organizations operating public-facing Drupal websites, especially those handling personal data under GDPR, face compliance risks if sensitive data is exposed. The low CVSS score suggests limited direct damage, but the risk of data leakage remains a concern, particularly for sectors like government, finance, healthcare, and e-commerce where Drupal is widely used. The absence of known exploits reduces immediate threat levels, but proactive patching is essential to mitigate potential future exploitation.
Mitigation Recommendations
European organizations should immediately assess their Drupal core versions and upgrade to the patched releases: 10.4.9, 10.5.6, 11.1.9, 11.2.8, or later. Beyond patching, administrators should review and harden access control configurations to ensure sensitive data is not cached in browsers. Implement HTTP headers such as Cache-Control: no-store and Pragma: no-cache on sensitive pages to prevent caching of confidential information. Conduct regular security audits focusing on web application caching policies and session management. Employ Content Security Policy (CSP) to restrict resource loading and reduce attack surface. Educate developers and administrators about secure caching practices and monitor web traffic for unusual access patterns that may indicate attempts to exploit cached data. Finally, ensure compliance with GDPR data protection requirements by minimizing sensitive data exposure and documenting mitigation efforts.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- drupal
- Date Reserved
- 2025-11-12T18:26:39.713Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 691ca896209f2030fa0168df
Added to database: 11/18/2025, 5:10:46 PM
Last enriched: 11/25/2025, 6:15:54 PM
Last updated: 1/8/2026, 10:52:38 AM
Views: 31
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-66001: CWE-295: Improper Certificate Validation in SUSE neuvector
HighCVE-2026-21874: CWE-772: Missing Release of Resource after Effective Lifetime in zauberzeug nicegui
MediumCVE-2026-21873: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in zauberzeug nicegui
HighCVE-2026-21872: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in zauberzeug nicegui
MediumCVE-2026-21871: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in zauberzeug nicegui
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.