Skip to main content

CVE-2025-47706: CWE-294 Authentication Bypass by Capture-replay in Drupal Enterprise MFA - TFA for Drupal

Medium
VulnerabilityCVE-2025-47706cvecve-2025-47706cwe-294
Published: Wed May 14 2025 (05/14/2025, 17:02:44 UTC)
Source: CVE
Vendor/Project: Drupal
Product: Enterprise MFA - TFA for Drupal

Description

Authentication Bypass by Capture-replay vulnerability in Drupal Enterprise MFA - TFA for Drupal allows Remote Services with Stolen Credentials.This issue affects Enterprise MFA - TFA for Drupal: from 0.0.0 before 4.7.0, from 5.0.0 before 5.2.0.

AI-Powered Analysis

AILast updated: 07/11/2025, 19:49:48 UTC

Technical Analysis

CVE-2025-47706 is an authentication bypass vulnerability classified under CWE-294 (Authentication Bypass) affecting the Enterprise MFA - TFA module for Drupal. This vulnerability allows an attacker to bypass multi-factor authentication (MFA) protections by performing a capture-replay attack. Specifically, the flaw exists in versions prior to 4.7.0 and between 5.0.0 and before 5.2.0 of the Enterprise MFA - TFA for Drupal module. An attacker who has obtained valid user credentials can remotely exploit this vulnerability without any user interaction or prior authentication to bypass the MFA mechanism, effectively negating the additional security layer provided by two-factor authentication. The vulnerability is remotely exploitable over the network (AV:N), requires high attack complexity (AC:H), does not require privileges (PR:N), and no user interaction (UI:N). The impact is limited to low confidentiality and integrity loss, with no impact on availability. No known exploits are currently reported in the wild, and no patches are linked yet. The vulnerability undermines the security assurances of MFA, which is critical for protecting sensitive Drupal-based web applications from unauthorized access, especially in enterprise environments where Drupal is used for content management and customer-facing portals.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the security of Drupal-based web applications that rely on the Enterprise MFA - TFA module for enhanced authentication security. Since MFA is a key defense against credential theft and unauthorized access, bypassing it can lead to unauthorized data access, potential data breaches, and compromise of user accounts. This could result in exposure of personal data protected under GDPR, leading to regulatory penalties and reputational damage. Organizations in sectors such as government, finance, healthcare, and e-commerce that use Drupal for critical services are particularly at risk. The medium CVSS score reflects that while the vulnerability requires high attack complexity, the absence of user interaction and privileges needed lowers the barrier for exploitation once credentials are compromised. The lack of known exploits suggests the threat is not yet widespread, but the potential for targeted attacks remains, especially against high-value targets in Europe.

Mitigation Recommendations

European organizations should immediately audit their Drupal installations to identify if the Enterprise MFA - TFA module is in use and determine the version deployed. It is critical to upgrade affected versions to 4.7.0 or later (for versions before 5.0.0) and to 5.2.0 or later (for versions 5.0.0 and above) once patches become available. Until patches are applied, organizations should consider temporarily disabling the vulnerable MFA module or implementing additional compensating controls such as IP whitelisting, VPN access restrictions, or enhanced monitoring of authentication logs for suspicious replay attempts. Employing network-level protections like Web Application Firewalls (WAFs) with custom rules to detect replay patterns may help mitigate exploitation risk. Additionally, organizations should enforce strong password policies and monitor for credential leaks to reduce the risk of stolen credentials being used in replay attacks. Regular security assessments and penetration testing focusing on authentication mechanisms are advised to detect similar weaknesses.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
drupal
Date Reserved
2025-05-07T16:02:44.265Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f81484d88663aeb773

Added to database: 5/20/2025, 6:59:04 PM

Last enriched: 7/11/2025, 7:49:48 PM

Last updated: 7/30/2025, 5:11:39 AM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats