Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13980: CWE-288 Authentication Bypass Using an Alternate Path or Channel in Drupal CKEditor 5 Premium Features

0
Medium
VulnerabilityCVE-2025-13980cvecve-2025-13980cwe-288
Published: Wed Jan 28 2026 (01/28/2026, 20:01:16 UTC)
Source: CVE Database V5
Vendor/Project: Drupal
Product: CKEditor 5 Premium Features

Description

CVE-2025-13980 is an authentication bypass vulnerability in Drupal's CKEditor 5 Premium Features that allows attackers to bypass authentication without any user interaction or privileges. It affects multiple versions prior to fixed releases, enabling unauthorized access through alternate paths or channels. The vulnerability has a medium severity with a CVSS score of 5. 3, impacting confidentiality but not integrity or availability. No known exploits are currently reported in the wild. European organizations using affected Drupal CKEditor 5 Premium Features versions could face unauthorized access risks, particularly those with public-facing Drupal sites. Mitigation requires prompt updating to patched versions beyond 1. 2. 10, 1. 3.

AI-Powered Analysis

AILast updated: 02/05/2026, 08:56:05 UTC

Technical Analysis

CVE-2025-13980 is a vulnerability classified under CWE-288 (Authentication Bypass Using an Alternate Path or Channel) affecting Drupal's CKEditor 5 Premium Features. This flaw allows attackers to bypass authentication mechanisms by exploiting alternate paths or channels within the CKEditor 5 Premium Features component. The affected versions include all releases from 0.0.0 up to but not including 1.2.10, 1.3.0 up to 1.3.6, 1.4.0 up to 1.4.3, 1.5.0 up to 1.5.1, and 1.6.0 up to 1.6.4. The vulnerability does not require any privileges or user interaction, making it remotely exploitable over the network (AV:N/AC:L/PR:N/UI:N). The CVSS v3.1 base score is 5.3, indicating medium severity, primarily impacting confidentiality (C:L) without affecting integrity or availability. The flaw enables unauthorized users to access functionality that should be restricted, potentially exposing sensitive content or administrative features. No public exploits are known at this time, but the vulnerability's nature suggests that exploitation could lead to unauthorized content access or manipulation of content editing workflows. The issue is particularly relevant for Drupal sites leveraging CKEditor 5 Premium Features, a widely used rich text editor component integrated into Drupal CMS for enhanced content editing capabilities. Since Drupal is popular among European public sector and enterprise organizations, the vulnerability poses a tangible risk to these entities if unpatched.

Potential Impact

For European organizations, the primary impact of CVE-2025-13980 lies in unauthorized access to content editing features within Drupal-powered websites using CKEditor 5 Premium Features. This could lead to exposure of sensitive or confidential information, unauthorized content modifications, or misuse of administrative functionalities. Public sector websites, educational institutions, and enterprises relying on Drupal for content management are at risk of data confidentiality breaches. Although the vulnerability does not directly affect system integrity or availability, unauthorized access can undermine trust, cause reputational damage, and potentially facilitate further attacks if combined with other vulnerabilities. The ease of exploitation without authentication or user interaction increases the risk of automated attacks or scanning by threat actors. Given Drupal's significant adoption in Europe, especially in countries with strong digital government initiatives, the impact could be widespread if not addressed promptly.

Mitigation Recommendations

1. Immediately upgrade CKEditor 5 Premium Features to the latest patched versions beyond 1.2.10, 1.3.6, 1.4.3, 1.5.1, or 1.6.4 depending on the installed version. 2. Restrict access to CKEditor 5 Premium Features to trusted users and networks, employing network segmentation and access control lists where feasible. 3. Implement web application firewalls (WAF) with custom rules to detect and block suspicious requests targeting CKEditor endpoints. 4. Monitor Drupal logs and web server access logs for unusual or unauthorized access attempts to CKEditor features. 5. Conduct regular vulnerability scans and penetration tests focusing on Drupal CMS and its components. 6. Educate site administrators about the risks of using outdated CKEditor versions and enforce patch management policies. 7. Consider disabling premium features if not essential until patches are applied. 8. Employ multi-factor authentication (MFA) for administrative access to Drupal sites to reduce risk from chained attacks.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
drupal
Date Reserved
2025-12-03T17:04:19.606Z
Cvss Version
null
State
PUBLISHED

Threat ID: 697a6c254623b1157cec16ff

Added to database: 1/28/2026, 8:05:57 PM

Last enriched: 2/5/2026, 8:56:05 AM

Last updated: 2/5/2026, 7:14:09 PM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats