Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14472: CWE-352 Cross-Site Request Forgery (CSRF) in Drupal Acquia Content Hub

0
High
VulnerabilityCVE-2025-14472cvecve-2025-14472cwe-352
Published: Wed Jan 28 2026 (01/28/2026, 20:03:09 UTC)
Source: CVE Database V5
Vendor/Project: Drupal
Product: Acquia Content Hub

Description

CVE-2025-14472 is a high-severity Cross-Site Request Forgery (CSRF) vulnerability affecting Drupal's Acquia Content Hub versions before 3. 6. 4 and between 3. 7. 0 and 3. 7. 3. The vulnerability allows attackers to trick authenticated users into executing unwanted actions on the Content Hub without their consent, potentially leading to unauthorized data modification or leakage. Exploitation requires user interaction but no privileges or authentication from the attacker. The vulnerability impacts confidentiality and integrity but not availability.

AI-Powered Analysis

AILast updated: 02/05/2026, 08:52:22 UTC

Technical Analysis

CVE-2025-14472 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the Acquia Content Hub module of Drupal, a widely used content management system. The affected versions include all releases from 0.0.0 up to but not including 3.6.4, and from 3.7.0 up to but not including 3.7.3. CSRF vulnerabilities occur when an attacker tricks an authenticated user into submitting a forged HTTP request, which the server trusts as legitimate. In this case, the vulnerability allows an attacker to induce authenticated users of Drupal sites that use Acquia Content Hub to perform unintended actions, such as modifying content or configuration, without their knowledge or consent. The CVSS 3.1 base score of 8.1 reflects that the attack vector is network-based (AV:N), requires no privileges (PR:N), but does require user interaction (UI:R). The impact on confidentiality and integrity is high (C:H, I:H), while availability is not affected (A:N). The vulnerability does not require the attacker to be authenticated, but the victim must be logged into the vulnerable Drupal site. No public exploits have been reported yet, but the high severity and widespread use of Drupal make this a significant risk. The vulnerability stems from insufficient anti-CSRF protections in the Acquia Content Hub module, allowing malicious cross-site requests to bypass security controls. The issue was reserved in December 2025 and published in January 2026. Since Acquia Content Hub is used for content syndication and sharing across Drupal sites, exploitation could lead to unauthorized content changes or data leakage across interconnected sites.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the confidentiality and integrity of web content managed via Drupal Acquia Content Hub. Organizations relying on this module for content distribution or synchronization could face unauthorized content modifications, potentially leading to misinformation, reputational damage, or data breaches. Given the network attack vector and lack of required privileges, attackers can target any authenticated user, increasing the attack surface. Public-facing Drupal sites in sectors such as government, finance, healthcare, and media are particularly at risk due to the sensitivity of their content and regulatory requirements like GDPR. Unauthorized content changes could also facilitate phishing or malware distribution campaigns. Although availability is not impacted, the integrity and confidentiality breaches could result in compliance violations and financial losses. The absence of known exploits in the wild provides a window for proactive mitigation, but the high CVSS score underscores the urgency. The interconnected nature of Acquia Content Hub deployments means a successful attack could propagate malicious changes across multiple sites, amplifying the impact.

Mitigation Recommendations

European organizations should immediately verify their Drupal Acquia Content Hub versions and upgrade to versions 3.6.4 or later, or 3.7.3 or later, where the vulnerability is patched. If upgrading is not immediately possible, implement strict CSRF token validation on all forms and state-changing requests within the Content Hub module. Employ Content Security Policy (CSP) headers to restrict the origins that can interact with the site, reducing the risk of malicious cross-site requests. Enforce secure cookie attributes (HttpOnly, Secure, SameSite=strict) to limit cookie exposure. Conduct thorough audits of user permissions to minimize the number of users with content modification rights, reducing potential attack impact. Monitor web server logs and Drupal audit logs for unusual or unauthorized content changes. Educate users about the risks of interacting with suspicious links while authenticated. Consider deploying web application firewalls (WAFs) with custom rules to detect and block CSRF attack patterns targeting Acquia Content Hub endpoints. Finally, maintain an incident response plan tailored to web application compromises involving content management systems.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
drupal
Date Reserved
2025-12-10T17:52:26.026Z
Cvss Version
null
State
PUBLISHED

Threat ID: 697a6c254623b1157cec1714

Added to database: 1/28/2026, 8:05:57 PM

Last enriched: 2/5/2026, 8:52:22 AM

Last updated: 2/8/2026, 12:24:30 AM

Views: 22

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats