Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13083: CWE-525 Use of Web Browser Cache Containing Sensitive Information in Drupal Drupal core

0
Low
VulnerabilityCVE-2025-13083cvecve-2025-13083cwe-525
Published: Tue Nov 18 2025 (11/18/2025, 16:55:37 UTC)
Source: CVE Database V5
Vendor/Project: Drupal
Product: Drupal core

Description

Use of Web Browser Cache Containing Sensitive Information vulnerability in Drupal Drupal core allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Drupal core: from 8.0.0 before 10.4.9, from 10.5.0 before 10.5.6, from 11.0.0 before 11.1.9, from 11.2.0 before 11.2.8.

AI-Powered Analysis

AILast updated: 11/18/2025, 17:24:09 UTC

Technical Analysis

CVE-2025-13083 is a security vulnerability classified under CWE-525, which concerns the use of web browser cache containing sensitive information. This vulnerability exists in Drupal core versions starting from 8.0.0 up to versions before 10.4.9, 10.5.0 before 10.5.6, 11.0.0 before 11.1.9, and 11.2.0 before 11.2.8. The root cause is incorrectly configured access control security levels that allow sensitive information to be cached by the user's web browser. When sensitive data such as authentication tokens, personal user information, or confidential business data is cached, it can be accessed by unauthorized parties who gain access to the client device or through other attack vectors that exploit cached data. This vulnerability does not require user interaction or authentication to be exploited, increasing its risk profile. While no public exploits are known at this time, the vulnerability's presence in widely used Drupal core versions means that many websites and web applications could be affected. The lack of a CVSS score indicates that the vulnerability is newly published and pending further assessment, but the nature of the issue suggests a significant risk to confidentiality and potentially integrity. The vulnerability can be mitigated by applying patches when released, configuring HTTP cache-control headers properly to prevent sensitive data from being cached, and reviewing access control policies to ensure sensitive content is not inadvertently exposed to caching mechanisms.

Potential Impact

For European organizations, the impact of CVE-2025-13083 can be substantial, especially for those relying on Drupal core for their web presence or web applications that handle sensitive or regulated data such as personal data under GDPR. Unauthorized access to cached sensitive information could lead to data breaches, loss of customer trust, regulatory penalties, and reputational damage. The exposure of authentication tokens or session data could allow attackers to impersonate users or escalate privileges. This vulnerability could also facilitate further attacks such as identity theft or fraud. Organizations in sectors like finance, healthcare, government, and e-commerce are particularly at risk due to the sensitivity of the data they process. Additionally, the vulnerability could undermine compliance efforts with European data protection regulations if sensitive data is not adequately protected. Since Drupal is widely used across Europe, the scope of affected systems is broad, increasing the potential impact on the European digital ecosystem.

Mitigation Recommendations

1. Immediately plan to upgrade Drupal core to the latest patched versions once they are released beyond 10.4.9, 10.5.6, 11.1.9, and 11.2.8. 2. In the interim, review and harden HTTP cache-control headers such as 'Cache-Control: no-store, no-cache, must-revalidate' and 'Pragma: no-cache' on pages serving sensitive information to prevent browser caching. 3. Audit and tighten access control configurations within Drupal to ensure sensitive content is not inadvertently exposed or cached. 4. Implement Content Security Policy (CSP) headers to restrict the sources of executable scripts and reduce the risk of cross-site scripting that could access cached data. 5. Educate users and administrators about the risks of cached sensitive data and encourage regular clearing of browser caches on shared or public devices. 6. Monitor web server logs and Drupal security advisories for updates and signs of exploitation attempts. 7. Consider deploying web application firewalls (WAFs) with rules to detect and block suspicious requests targeting caching mechanisms. 8. Conduct regular security assessments and penetration tests focusing on caching behavior and access control enforcement.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
drupal
Date Reserved
2025-11-12T18:26:39.713Z
Cvss Version
null
State
PUBLISHED

Threat ID: 691ca896209f2030fa0168df

Added to database: 11/18/2025, 5:10:46 PM

Last enriched: 11/18/2025, 5:24:09 PM

Last updated: 11/22/2025, 1:42:39 PM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats