CVE-2025-14472: CWE-352 Cross-Site Request Forgery (CSRF) in Drupal Acquia Content Hub
CVE-2025-14472 is a high-severity Cross-Site Request Forgery (CSRF) vulnerability affecting Drupal's Acquia Content Hub versions before 3. 6. 4 and between 3. 7. 0 and 3. 7. 3. The vulnerability allows attackers to trick authenticated users into executing unwanted actions on the Content Hub without their consent, potentially leading to unauthorized data modification or leakage. Exploitation requires user interaction but no privileges or authentication from the attacker. The vulnerability impacts confidentiality and integrity but not availability.
AI Analysis
Technical Summary
CVE-2025-14472 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the Acquia Content Hub module of Drupal, a widely used content management system. The affected versions include all releases from 0.0.0 up to but not including 3.6.4, and from 3.7.0 up to but not including 3.7.3. CSRF vulnerabilities occur when an attacker tricks an authenticated user into submitting a forged HTTP request, which the server trusts as legitimate. In this case, the vulnerability allows an attacker to induce authenticated users of Drupal sites that use Acquia Content Hub to perform unintended actions, such as modifying content or configuration, without their knowledge or consent. The CVSS 3.1 base score of 8.1 reflects that the attack vector is network-based (AV:N), requires no privileges (PR:N), but does require user interaction (UI:R). The impact on confidentiality and integrity is high (C:H, I:H), while availability is not affected (A:N). The vulnerability does not require the attacker to be authenticated, but the victim must be logged into the vulnerable Drupal site. No public exploits have been reported yet, but the high severity and widespread use of Drupal make this a significant risk. The vulnerability stems from insufficient anti-CSRF protections in the Acquia Content Hub module, allowing malicious cross-site requests to bypass security controls. The issue was reserved in December 2025 and published in January 2026. Since Acquia Content Hub is used for content syndication and sharing across Drupal sites, exploitation could lead to unauthorized content changes or data leakage across interconnected sites.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the confidentiality and integrity of web content managed via Drupal Acquia Content Hub. Organizations relying on this module for content distribution or synchronization could face unauthorized content modifications, potentially leading to misinformation, reputational damage, or data breaches. Given the network attack vector and lack of required privileges, attackers can target any authenticated user, increasing the attack surface. Public-facing Drupal sites in sectors such as government, finance, healthcare, and media are particularly at risk due to the sensitivity of their content and regulatory requirements like GDPR. Unauthorized content changes could also facilitate phishing or malware distribution campaigns. Although availability is not impacted, the integrity and confidentiality breaches could result in compliance violations and financial losses. The absence of known exploits in the wild provides a window for proactive mitigation, but the high CVSS score underscores the urgency. The interconnected nature of Acquia Content Hub deployments means a successful attack could propagate malicious changes across multiple sites, amplifying the impact.
Mitigation Recommendations
European organizations should immediately verify their Drupal Acquia Content Hub versions and upgrade to versions 3.6.4 or later, or 3.7.3 or later, where the vulnerability is patched. If upgrading is not immediately possible, implement strict CSRF token validation on all forms and state-changing requests within the Content Hub module. Employ Content Security Policy (CSP) headers to restrict the origins that can interact with the site, reducing the risk of malicious cross-site requests. Enforce secure cookie attributes (HttpOnly, Secure, SameSite=strict) to limit cookie exposure. Conduct thorough audits of user permissions to minimize the number of users with content modification rights, reducing potential attack impact. Monitor web server logs and Drupal audit logs for unusual or unauthorized content changes. Educate users about the risks of interacting with suspicious links while authenticated. Consider deploying web application firewalls (WAFs) with custom rules to detect and block CSRF attack patterns targeting Acquia Content Hub endpoints. Finally, maintain an incident response plan tailored to web application compromises involving content management systems.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2025-14472: CWE-352 Cross-Site Request Forgery (CSRF) in Drupal Acquia Content Hub
Description
CVE-2025-14472 is a high-severity Cross-Site Request Forgery (CSRF) vulnerability affecting Drupal's Acquia Content Hub versions before 3. 6. 4 and between 3. 7. 0 and 3. 7. 3. The vulnerability allows attackers to trick authenticated users into executing unwanted actions on the Content Hub without their consent, potentially leading to unauthorized data modification or leakage. Exploitation requires user interaction but no privileges or authentication from the attacker. The vulnerability impacts confidentiality and integrity but not availability.
AI-Powered Analysis
Technical Analysis
CVE-2025-14472 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the Acquia Content Hub module of Drupal, a widely used content management system. The affected versions include all releases from 0.0.0 up to but not including 3.6.4, and from 3.7.0 up to but not including 3.7.3. CSRF vulnerabilities occur when an attacker tricks an authenticated user into submitting a forged HTTP request, which the server trusts as legitimate. In this case, the vulnerability allows an attacker to induce authenticated users of Drupal sites that use Acquia Content Hub to perform unintended actions, such as modifying content or configuration, without their knowledge or consent. The CVSS 3.1 base score of 8.1 reflects that the attack vector is network-based (AV:N), requires no privileges (PR:N), but does require user interaction (UI:R). The impact on confidentiality and integrity is high (C:H, I:H), while availability is not affected (A:N). The vulnerability does not require the attacker to be authenticated, but the victim must be logged into the vulnerable Drupal site. No public exploits have been reported yet, but the high severity and widespread use of Drupal make this a significant risk. The vulnerability stems from insufficient anti-CSRF protections in the Acquia Content Hub module, allowing malicious cross-site requests to bypass security controls. The issue was reserved in December 2025 and published in January 2026. Since Acquia Content Hub is used for content syndication and sharing across Drupal sites, exploitation could lead to unauthorized content changes or data leakage across interconnected sites.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the confidentiality and integrity of web content managed via Drupal Acquia Content Hub. Organizations relying on this module for content distribution or synchronization could face unauthorized content modifications, potentially leading to misinformation, reputational damage, or data breaches. Given the network attack vector and lack of required privileges, attackers can target any authenticated user, increasing the attack surface. Public-facing Drupal sites in sectors such as government, finance, healthcare, and media are particularly at risk due to the sensitivity of their content and regulatory requirements like GDPR. Unauthorized content changes could also facilitate phishing or malware distribution campaigns. Although availability is not impacted, the integrity and confidentiality breaches could result in compliance violations and financial losses. The absence of known exploits in the wild provides a window for proactive mitigation, but the high CVSS score underscores the urgency. The interconnected nature of Acquia Content Hub deployments means a successful attack could propagate malicious changes across multiple sites, amplifying the impact.
Mitigation Recommendations
European organizations should immediately verify their Drupal Acquia Content Hub versions and upgrade to versions 3.6.4 or later, or 3.7.3 or later, where the vulnerability is patched. If upgrading is not immediately possible, implement strict CSRF token validation on all forms and state-changing requests within the Content Hub module. Employ Content Security Policy (CSP) headers to restrict the origins that can interact with the site, reducing the risk of malicious cross-site requests. Enforce secure cookie attributes (HttpOnly, Secure, SameSite=strict) to limit cookie exposure. Conduct thorough audits of user permissions to minimize the number of users with content modification rights, reducing potential attack impact. Monitor web server logs and Drupal audit logs for unusual or unauthorized content changes. Educate users about the risks of interacting with suspicious links while authenticated. Consider deploying web application firewalls (WAFs) with custom rules to detect and block CSRF attack patterns targeting Acquia Content Hub endpoints. Finally, maintain an incident response plan tailored to web application compromises involving content management systems.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- drupal
- Date Reserved
- 2025-12-10T17:52:26.026Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 697a6c254623b1157cec1714
Added to database: 1/28/2026, 8:05:57 PM
Last enriched: 2/5/2026, 8:52:22 AM
Last updated: 2/6/2026, 3:10:13 AM
Views: 20
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1974: Denial of Service in Free5GC
MediumCVE-2026-1973: NULL Pointer Dereference in Free5GC
MediumCVE-2026-1972: Use of Default Credentials in Edimax BR-6208AC
MediumCVE-2026-1971: Cross Site Scripting in Edimax BR-6288ACL
MediumCVE-2026-23623: CWE-285: Improper Authorization in CollaboraOnline online
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.