CVE-2025-31673: CWE-863 Incorrect Authorization in Drupal Drupal core
Incorrect Authorization vulnerability in Drupal Drupal core allows Forceful Browsing.This issue affects Drupal core: from 8.0.0 before 10.3.13, from 10.4.0 before 10.4.3, from 11.0.0 before 11.0.12, from 11.1.0 before 11.1.3.
AI Analysis
Technical Summary
CVE-2025-31673 is an Incorrect Authorization vulnerability (CWE-863) affecting multiple versions of Drupal core, specifically from versions 8.0.0 before 10.3.13, 10.4.0 before 10.4.3, 11.0.0 before 11.0.12, and 11.1.0 before 11.1.3. The vulnerability enables Forceful Browsing, a technique where an attacker can bypass authorization controls to access resources or pages that should be restricted. This occurs due to improper enforcement of access control policies within Drupal's core authorization mechanisms. The vulnerability requires the attacker to have some level of privileges (as indicated by the CVSS vector requiring PR:L, meaning low privileges), and user interaction is necessary (UI:R). The attack vector is network-based (AV:N), and the vulnerability does not affect availability but impacts confidentiality and integrity to a limited extent (C:L/I:L/A:N). The vulnerability is classified as medium severity with a CVSS score of 4.6. No known exploits are currently reported in the wild, and no official patches or mitigation links were provided at the time of this report. The issue affects a broad range of Drupal core versions, which is a widely used content management system (CMS) for websites and web applications, including many enterprise and government sites. The flaw could allow unauthorized users with limited privileges to access or manipulate content or configuration data beyond their authorization, potentially leading to data leakage or unauthorized modifications within affected Drupal installations.
Potential Impact
For European organizations, the impact of this vulnerability can be significant given Drupal's widespread adoption across public sector websites, educational institutions, and private enterprises. Unauthorized access through forceful browsing could lead to exposure of sensitive information, unauthorized content changes, or access to administrative functions depending on the site's configuration. This could undermine trust, lead to data privacy violations under GDPR, and disrupt business operations or public services. Although the vulnerability does not directly impact availability, the integrity and confidentiality breaches could have cascading effects, such as reputational damage, regulatory penalties, and increased risk of further exploitation if attackers leverage the unauthorized access to escalate privileges or implant malicious content. Organizations relying on Drupal for critical web infrastructure should consider this a medium risk but with potential for escalation if combined with other vulnerabilities or misconfigurations.
Mitigation Recommendations
Apply official Drupal core updates to versions 10.3.13, 10.4.3, 11.0.12, or 11.1.3 as soon as they become available to remediate the authorization flaw. Implement strict access control policies and review user roles and permissions to minimize the number of users with elevated privileges that could exploit this vulnerability. Use web application firewalls (WAFs) with custom rules to detect and block suspicious forceful browsing attempts targeting Drupal endpoints. Conduct thorough security audits and penetration testing focusing on authorization mechanisms and access control enforcement within Drupal sites. Monitor web server and Drupal logs for unusual access patterns indicative of forceful browsing or privilege misuse. Isolate critical Drupal instances behind VPNs or restrict access to trusted IP ranges where feasible to reduce exposure. Educate site administrators and developers on secure configuration practices and the importance of timely patching for Drupal core components.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium, Poland, Austria
CVE-2025-31673: CWE-863 Incorrect Authorization in Drupal Drupal core
Description
Incorrect Authorization vulnerability in Drupal Drupal core allows Forceful Browsing.This issue affects Drupal core: from 8.0.0 before 10.3.13, from 10.4.0 before 10.4.3, from 11.0.0 before 11.0.12, from 11.1.0 before 11.1.3.
AI-Powered Analysis
Technical Analysis
CVE-2025-31673 is an Incorrect Authorization vulnerability (CWE-863) affecting multiple versions of Drupal core, specifically from versions 8.0.0 before 10.3.13, 10.4.0 before 10.4.3, 11.0.0 before 11.0.12, and 11.1.0 before 11.1.3. The vulnerability enables Forceful Browsing, a technique where an attacker can bypass authorization controls to access resources or pages that should be restricted. This occurs due to improper enforcement of access control policies within Drupal's core authorization mechanisms. The vulnerability requires the attacker to have some level of privileges (as indicated by the CVSS vector requiring PR:L, meaning low privileges), and user interaction is necessary (UI:R). The attack vector is network-based (AV:N), and the vulnerability does not affect availability but impacts confidentiality and integrity to a limited extent (C:L/I:L/A:N). The vulnerability is classified as medium severity with a CVSS score of 4.6. No known exploits are currently reported in the wild, and no official patches or mitigation links were provided at the time of this report. The issue affects a broad range of Drupal core versions, which is a widely used content management system (CMS) for websites and web applications, including many enterprise and government sites. The flaw could allow unauthorized users with limited privileges to access or manipulate content or configuration data beyond their authorization, potentially leading to data leakage or unauthorized modifications within affected Drupal installations.
Potential Impact
For European organizations, the impact of this vulnerability can be significant given Drupal's widespread adoption across public sector websites, educational institutions, and private enterprises. Unauthorized access through forceful browsing could lead to exposure of sensitive information, unauthorized content changes, or access to administrative functions depending on the site's configuration. This could undermine trust, lead to data privacy violations under GDPR, and disrupt business operations or public services. Although the vulnerability does not directly impact availability, the integrity and confidentiality breaches could have cascading effects, such as reputational damage, regulatory penalties, and increased risk of further exploitation if attackers leverage the unauthorized access to escalate privileges or implant malicious content. Organizations relying on Drupal for critical web infrastructure should consider this a medium risk but with potential for escalation if combined with other vulnerabilities or misconfigurations.
Mitigation Recommendations
Apply official Drupal core updates to versions 10.3.13, 10.4.3, 11.0.12, or 11.1.3 as soon as they become available to remediate the authorization flaw. Implement strict access control policies and review user roles and permissions to minimize the number of users with elevated privileges that could exploit this vulnerability. Use web application firewalls (WAFs) with custom rules to detect and block suspicious forceful browsing attempts targeting Drupal endpoints. Conduct thorough security audits and penetration testing focusing on authorization mechanisms and access control enforcement within Drupal sites. Monitor web server and Drupal logs for unusual access patterns indicative of forceful browsing or privilege misuse. Isolate critical Drupal instances behind VPNs or restrict access to trusted IP ranges where feasible to reduce exposure. Educate site administrators and developers on secure configuration practices and the importance of timely patching for Drupal core components.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- drupal
- Date Reserved
- 2025-03-31T21:30:04.614Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d983cc4522896dcbeeae1
Added to database: 5/21/2025, 9:09:16 AM
Last enriched: 6/25/2025, 1:21:39 AM
Last updated: 10/16/2025, 12:50:20 PM
Views: 31
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-9955: Vulnerability in WSO2 WSO2 Enterprise Integrator
MediumCVE-2025-10611: Vulnerability in WSO2 WSO2 API Manager
CriticalFuji Electric HMI Configurator Flaws Expose Industrial Organizations to Hacking
MediumCVE-2025-58426: Use of hard-coded cryptographic key in NEOJAPAN Inc. desknet's NEO
MediumCVE-2025-58079: Improper Protection of Alternate Path in NEOJAPAN Inc. desknet's NEO
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.