Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14472: CWE-352 Cross-Site Request Forgery (CSRF) in Drupal Acquia Content Hub

0
Unknown
VulnerabilityCVE-2025-14472cvecve-2025-14472cwe-352
Published: Wed Jan 28 2026 (01/28/2026, 20:03:09 UTC)
Source: CVE Database V5
Vendor/Project: Drupal
Product: Acquia Content Hub

Description

Cross-Site Request Forgery (CSRF) vulnerability in Drupal Acquia Content Hub allows Cross Site Request Forgery.This issue affects Acquia Content Hub: from 0.0.0 before 3.6.4, from 3.7.0 before 3.7.3.

AI-Powered Analysis

AILast updated: 01/28/2026, 20:20:31 UTC

Technical Analysis

CVE-2025-14472 is a security vulnerability classified under CWE-352, indicating a Cross-Site Request Forgery (CSRF) issue within the Drupal Acquia Content Hub module. This module facilitates content synchronization across Drupal instances and external systems. The vulnerability affects versions from initial releases up to 3.6.4 and from 3.7.0 up to but not including 3.7.3. CSRF vulnerabilities allow attackers to induce authenticated users to perform unintended actions by exploiting the trust a web application places in the user's browser. In this case, an attacker could craft a malicious web page or link that, when visited by an authenticated user of Acquia Content Hub, triggers unauthorized requests that the system processes as legitimate. This could result in unauthorized content changes, configuration modifications, or other actions permitted by the user's privileges within the Content Hub. The vulnerability does not have a CVSS score assigned yet, and no public exploits have been reported. However, the risk lies in the potential for attackers to manipulate content synchronization workflows, which could disrupt content integrity and availability. Since the exploit requires user authentication and user interaction (visiting a malicious page), the attack vector is somewhat limited but still significant for environments with high-value content and collaboration. The absence of patch links in the provided data suggests that users should monitor official Drupal and Acquia channels for updates and advisories. Organizations relying on Acquia Content Hub should assess their exposure, especially if they use affected versions, and plan for prompt remediation once patches are available.

Potential Impact

For European organizations, the impact of this CSRF vulnerability can be substantial, particularly for those heavily reliant on Drupal Acquia Content Hub for content management and synchronization across multiple sites or platforms. Successful exploitation could lead to unauthorized content modifications, potentially causing misinformation, reputational damage, or operational disruptions. Integrity of published content could be compromised, affecting customer trust and compliance with content governance policies. Availability might also be impacted if attackers manipulate synchronization processes, leading to content outages or inconsistencies. Given the collaborative nature of content hubs, the vulnerability could facilitate lateral movement within an organization's digital infrastructure if combined with other vulnerabilities. Organizations in sectors such as media, government, education, and e-commerce, which frequently use Drupal, may face increased risks. Additionally, regulatory frameworks like GDPR emphasize data integrity and security, so exploitation could have legal and financial consequences. The requirement for user authentication and interaction limits the attack scope but does not eliminate risk, especially in environments with many users or where users have elevated privileges.

Mitigation Recommendations

To mitigate this vulnerability effectively, European organizations should: 1) Immediately inventory Drupal Acquia Content Hub installations and identify affected versions. 2) Monitor official Drupal and Acquia security advisories for the release of patches addressing CVE-2025-14472 and apply them promptly. 3) Implement or reinforce anti-CSRF tokens and validation mechanisms in all forms and state-changing requests within the Content Hub environment. 4) Educate users about the risks of clicking on suspicious links or visiting untrusted websites while authenticated to Drupal systems. 5) Employ web application firewalls (WAFs) with rules designed to detect and block CSRF attack patterns targeting Acquia Content Hub endpoints. 6) Restrict user privileges to the minimum necessary, limiting the potential impact of compromised accounts. 7) Enable comprehensive logging and monitoring to detect unusual or unauthorized actions within the Content Hub. 8) Consider network segmentation and access controls to reduce exposure of critical content management systems. 9) Conduct regular security assessments and penetration testing focusing on web application vulnerabilities including CSRF. 10) Prepare incident response plans specific to content integrity breaches to ensure rapid containment and recovery.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
drupal
Date Reserved
2025-12-10T17:52:26.026Z
Cvss Version
null
State
PUBLISHED

Threat ID: 697a6c254623b1157cec1714

Added to database: 1/28/2026, 8:05:57 PM

Last enriched: 1/28/2026, 8:20:31 PM

Last updated: 1/28/2026, 10:25:05 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats