Skip to main content

CVE-2025-47701: CWE-352 Cross-Site Request Forgery (CSRF) in Drupal Restrict route by IP

High
VulnerabilityCVE-2025-47701cvecve-2025-47701cwe-352
Published: Wed May 14 2025 (05/14/2025, 17:01:18 UTC)
Source: CVE
Vendor/Project: Drupal
Product: Restrict route by IP

Description

Cross-Site Request Forgery (CSRF) vulnerability in Drupal Restrict route by IP allows Cross Site Request Forgery.This issue affects Restrict route by IP: from 0.0.0 before 1.3.0.

AI-Powered Analysis

AILast updated: 07/11/2025, 13:04:27 UTC

Technical Analysis

CVE-2025-47701 is a high-severity Cross-Site Request Forgery (CSRF) vulnerability identified in the Drupal module 'Restrict route by IP', affecting versions prior to 1.3.0. This vulnerability allows an attacker to trick an authenticated Drupal user into submitting unauthorized requests to the web application without their consent. Specifically, the CSRF flaw arises because the module does not adequately verify the legitimacy of state-changing requests, enabling attackers to exploit the victim's active session to perform actions such as modifying access restrictions or other sensitive configurations tied to IP-based route restrictions. The vulnerability is remotely exploitable over the network (AV:N), requires no privileges (PR:N), but does require user interaction (UI:R), and impacts confidentiality, integrity, and availability (C:H/I:H/A:H). The CVSS 3.1 base score of 8.8 reflects the critical nature of this vulnerability, emphasizing the potential for significant damage if exploited. Although no known exploits are currently reported in the wild, the module's role in controlling access based on IP addresses means successful exploitation could allow attackers to bypass or manipulate access controls, potentially exposing sensitive resources or disrupting service availability. The vulnerability affects the 'Restrict route by IP' module, which is used to limit access to specific routes in Drupal based on client IP addresses, a common security control in many Drupal deployments.

Potential Impact

For European organizations utilizing Drupal with the 'Restrict route by IP' module, this vulnerability poses a substantial risk. Exploitation could lead to unauthorized access to restricted areas of web applications, data leakage, or unauthorized changes to access policies, undermining the confidentiality and integrity of sensitive information. Additionally, attackers could disrupt service availability by manipulating route restrictions, potentially causing denial of service or operational disruptions. Given the widespread use of Drupal in government, healthcare, education, and enterprise sectors across Europe, the impact could be significant, especially for organizations relying on IP-based access controls as a primary security measure. The vulnerability could also facilitate lateral movement within networks if attackers gain access to administrative routes or sensitive backend functionality. Compliance with GDPR and other European data protection regulations could be jeopardized if personal data is exposed or access controls are bypassed, leading to legal and reputational consequences.

Mitigation Recommendations

European organizations should immediately verify if the 'Restrict route by IP' module is installed and identify the version in use. Since no patch links are currently provided, organizations should monitor Drupal security advisories closely for the release of version 1.3.0 or later that addresses this vulnerability. In the interim, consider disabling the module if feasible or restricting its use to non-critical routes. Implement additional CSRF protections at the application level, such as enforcing CSRF tokens on all state-changing requests and validating the origin and referer headers. Employ web application firewalls (WAFs) with rules to detect and block CSRF attack patterns targeting Drupal endpoints. Conduct thorough access reviews to ensure that IP-based restrictions are supplemented with robust authentication and authorization controls. Educate users about the risks of interacting with untrusted websites while authenticated to Drupal applications. Finally, implement comprehensive monitoring and logging to detect suspicious activities that may indicate exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
drupal
Date Reserved
2025-05-07T16:02:44.264Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f71484d88663aeae5c

Added to database: 5/20/2025, 6:59:03 PM

Last enriched: 7/11/2025, 1:04:27 PM

Last updated: 7/27/2025, 8:35:51 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats