Skip to main content

CVE-2025-4416: CWE-770 Allocation of Resources Without Limits or Throttling in Drupal Events Log Track

High
VulnerabilityCVE-2025-4416cvecve-2025-4416cwe-770
Published: Wed May 21 2025 (05/21/2025, 16:21:55 UTC)
Source: CVE
Vendor/Project: Drupal
Product: Events Log Track

Description

Allocation of Resources Without Limits or Throttling vulnerability in Drupal Events Log Track allows Excessive Allocation.This issue affects Events Log Track: from 0.0.0 before 3.1.11, from 4.0.0 before 4.0.2.

AI-Powered Analysis

AILast updated: 07/07/2025, 14:10:07 UTC

Technical Analysis

CVE-2025-4416 is a high-severity vulnerability classified under CWE-770, which pertains to the Allocation of Resources Without Limits or Throttling. This vulnerability affects the Drupal Events Log Track module versions prior to 3.1.11 and 4.0.2, specifically from versions 0.0.0 before 3.1.11 and from 4.0.0 before 4.0.2. The flaw allows an attacker to cause excessive resource allocation by exploiting the lack of limits or throttling mechanisms in the event logging functionality. Since the vulnerability has a CVSS 3.1 base score of 7.5, it is considered high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact is limited to availability (A:H), meaning the vulnerability can be leveraged to cause denial of service (DoS) conditions by exhausting system resources such as memory or CPU cycles through continuous or crafted event logging requests. There is no impact on confidentiality or integrity. The vulnerability does not require authentication or user interaction, making it easier for remote attackers to exploit. No known exploits are currently reported in the wild, and no official patches or mitigation links are provided yet, though affected versions are clearly identified. The root cause is the absence of resource allocation limits or throttling controls in the Events Log Track module, which is responsible for tracking and logging events in Drupal-based systems. Without these controls, attackers can flood the logging mechanism, leading to resource exhaustion and potential service disruption.

Potential Impact

For European organizations using Drupal with the Events Log Track module, this vulnerability poses a significant risk of denial of service attacks that can disrupt web services and online operations. Given Drupal's widespread use in government, education, and enterprise sectors across Europe, exploitation could lead to downtime of critical websites and applications, impacting service availability and user trust. The lack of required authentication and user interaction means attackers can remotely trigger the vulnerability without prior access, increasing the threat surface. Disruption of public-facing services could have cascading effects on business continuity, customer engagement, and regulatory compliance, especially under GDPR where service availability is a component of data protection obligations. Additionally, organizations relying on Drupal for internal portals or intranet services may face operational interruptions. Although no confidentiality or integrity impact is noted, the availability impact alone can cause significant operational and reputational damage.

Mitigation Recommendations

European organizations should immediately assess their Drupal instances to identify if the Events Log Track module is installed and determine the version in use. Upgrading to version 3.1.11 or later, or 4.0.2 or later, as applicable, is the primary mitigation step once patches are available. Until patches are released, organizations should implement rate limiting and throttling at the web server or application firewall level to restrict the volume of event logging requests. Monitoring and alerting on unusual spikes in event log activity can help detect exploitation attempts early. Additionally, disabling or removing the Events Log Track module if it is not essential can reduce exposure. Network-level protections such as IP reputation filtering and geo-blocking may also reduce attack surface. Organizations should review their incident response plans to include scenarios involving resource exhaustion attacks and ensure adequate capacity planning to handle potential spikes. Finally, maintaining up-to-date backups and ensuring rapid patch management processes will support recovery and resilience.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
drupal
Date Reserved
2025-05-07T16:02:54.499Z
Cisa Enriched
false
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682e0169c4522896dcc0f084

Added to database: 5/21/2025, 4:38:01 PM

Last enriched: 7/7/2025, 2:10:07 PM

Last updated: 7/30/2025, 9:14:59 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats