Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13083: CWE-525 Use of Web Browser Cache Containing Sensitive Information in Drupal Drupal core

0
Low
VulnerabilityCVE-2025-13083cvecve-2025-13083cwe-525
Published: Tue Nov 18 2025 (11/18/2025, 16:55:37 UTC)
Source: CVE Database V5
Vendor/Project: Drupal
Product: Drupal core

Description

Use of Web Browser Cache Containing Sensitive Information vulnerability in Drupal Drupal core allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Drupal core: from 8.0.0 before 10.4.9, from 10.5.0 before 10.5.6, from 11.0.0 before 11.1.9, from 11.2.0 before 11.2.8, from 7.0 before 7.103.

AI-Powered Analysis

AILast updated: 01/17/2026, 07:22:56 UTC

Technical Analysis

CVE-2025-13083 is a security vulnerability identified in Drupal core, spanning versions from 7.0 through multiple major releases up to 11.2.8. The issue arises from the improper use of web browser caching mechanisms that store sensitive information due to incorrectly configured access control security levels within Drupal. Specifically, sensitive data that should not be cached by browsers may be stored in the cache, potentially allowing unauthorized users with access to the client device or network to retrieve this information. The vulnerability is classified under CWE-525, which concerns the use of web browser cache containing sensitive data. The CVSS v3.1 base score is 3.7 (low), with vector AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N, indicating that the attack vector is network-based, requires high attack complexity, no privileges or user interaction, and impacts confidentiality only. No known exploits have been reported in the wild as of the publication date. The vulnerability affects Drupal core versions from 8.0.0 before 10.4.9, 10.5.0 before 10.5.6, 11.0.0 before 11.1.9, 11.2.0 before 11.2.8, and 7.0 before 7.103. The root cause is misconfiguration of access control settings that fail to prevent sensitive content from being cached by browsers, which can lead to unintended data exposure. The issue can be mitigated by applying patches in the fixed versions and ensuring proper cache-control headers and access control policies are enforced to prevent sensitive data caching.

Potential Impact

For European organizations, this vulnerability primarily threatens the confidentiality of sensitive information processed or displayed by Drupal-based websites or applications. Organizations handling personal data, financial information, or confidential business data through Drupal platforms could inadvertently expose such data to unauthorized parties if browser caches are accessed by attackers or unauthorized users. This risk is heightened in environments where client devices are shared, compromised, or subject to network interception. Although the vulnerability does not affect data integrity or availability, the leakage of sensitive information could lead to privacy violations, regulatory non-compliance (e.g., GDPR), reputational damage, and potential legal consequences. The low CVSS score reflects the requirement for high attack complexity and no direct integrity or availability impact, but the widespread use of Drupal in Europe means the aggregate risk is non-negligible. Organizations with public-facing Drupal sites or intranet portals should prioritize patching and configuration reviews to mitigate this exposure.

Mitigation Recommendations

1. Upgrade Drupal core to the fixed versions: at least 10.4.9, 10.5.6, 11.1.9, 11.2.8, or 7.103 depending on the version in use. 2. Review and enforce strict cache-control HTTP headers (e.g., Cache-Control: no-store, no-cache, private) on pages or API responses containing sensitive information to prevent browser caching. 3. Audit access control configurations within Drupal to ensure sensitive content is properly restricted and not inadvertently exposed to unauthorized users or cached. 4. Implement Content Security Policy (CSP) headers to reduce the risk of client-side data leakage. 5. Educate developers and administrators on secure caching practices and the risks of sensitive data caching. 6. Monitor web server and application logs for unusual access patterns that might indicate attempts to exploit cached data. 7. For highly sensitive environments, consider disabling browser caching entirely for authenticated or sensitive sessions. 8. Conduct regular security assessments and penetration testing focusing on caching and access control mechanisms.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
drupal
Date Reserved
2025-11-12T18:26:39.713Z
Cvss Version
null
State
PUBLISHED

Threat ID: 691ca896209f2030fa0168df

Added to database: 11/18/2025, 5:10:46 PM

Last enriched: 1/17/2026, 7:22:56 AM

Last updated: 2/7/2026, 3:36:47 PM

Views: 50

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats