Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13083: CWE-525 Use of Web Browser Cache Containing Sensitive Information in Drupal Drupal core

0
Low
VulnerabilityCVE-2025-13083cvecve-2025-13083cwe-525
Published: Tue Nov 18 2025 (11/18/2025, 16:55:37 UTC)
Source: CVE Database V5
Vendor/Project: Drupal
Product: Drupal core

Description

Use of Web Browser Cache Containing Sensitive Information vulnerability in Drupal Drupal core allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Drupal core: from 8.0.0 before 10.4.9, from 10.5.0 before 10.5.6, from 11.0.0 before 11.1.9, from 11.2.0 before 11.2.8, from 7.0 before 7.103.

AI-Powered Analysis

AILast updated: 01/08/2026, 18:34:53 UTC

Technical Analysis

CVE-2025-13083 is a vulnerability classified under CWE-525, concerning the use of web browser cache containing sensitive information in Drupal core. This issue arises from incorrectly configured access control security levels that allow sensitive data to be cached by the user's web browser. Affected versions include Drupal core from 7.0 before 7.103, 8.0.0 before 10.4.9, 10.5.0 before 10.5.6, 11.0.0 before 11.1.9, and 11.2.0 before 11.2.8. The vulnerability does not require user interaction or privileges but has a high attack complexity, meaning exploitation is not straightforward. The impact is limited to confidentiality, as attackers could potentially retrieve sensitive information from the browser cache if they gain access to the victim's device or browser data. There are no known exploits in the wild at the time of publication. The vulnerability is mitigated by proper configuration of cache-control headers and access control settings within Drupal to prevent sensitive content from being cached by browsers. Since Drupal is widely used for content management across many sectors, improper caching could expose sensitive user or organizational data if left unpatched.

Potential Impact

For European organizations, the primary impact of CVE-2025-13083 is the potential unauthorized disclosure of sensitive information through browser cache leakage. This could include session tokens, personal data, or confidential content accessible via cached pages. While the vulnerability does not allow direct system compromise or data manipulation, the confidentiality breach could facilitate further attacks such as session hijacking or identity theft. Organizations in sectors handling sensitive personal data (e.g., government, healthcare, finance) are particularly at risk. The impact is mitigated by the high attack complexity and the requirement for physical or remote access to the victim's browser cache, limiting large-scale exploitation. However, organizations with remote or shared work environments should be cautious, as cached data on shared devices could be accessed by unauthorized users. Failure to address this vulnerability could lead to reputational damage and non-compliance with data protection regulations like GDPR if personal data is exposed.

Mitigation Recommendations

1. Immediately update Drupal core to the latest patched versions: 7.103, 10.4.9 or later, 10.5.6 or later, 11.1.9 or later, and 11.2.8 or later. 2. Review and enforce strict cache-control headers (e.g., 'Cache-Control: no-store, no-cache, must-revalidate') on pages serving sensitive information to prevent browser caching. 3. Audit and correct access control configurations within Drupal to ensure sensitive content is not accessible without proper authorization. 4. Educate users and administrators about the risks of browser caching sensitive data, especially on shared or public devices. 5. Implement browser security policies such as Content Security Policy (CSP) and HTTP Strict Transport Security (HSTS) to reduce attack surface. 6. Regularly monitor and audit web server and application logs for unusual access patterns that might indicate attempts to exploit cached data. 7. Consider deploying endpoint security solutions that protect browser cache data on user devices, especially in high-risk environments. 8. Conduct periodic security assessments and penetration testing focusing on cache-related vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
drupal
Date Reserved
2025-11-12T18:26:39.713Z
Cvss Version
null
State
PUBLISHED

Threat ID: 691ca896209f2030fa0168df

Added to database: 11/18/2025, 5:10:46 PM

Last enriched: 1/8/2026, 6:34:53 PM

Last updated: 1/9/2026, 9:02:56 AM

Views: 34

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats