CVE-2025-47706: CWE-294 Authentication Bypass by Capture-replay in Drupal Enterprise MFA - TFA for Drupal
Authentication Bypass by Capture-replay vulnerability in Drupal Enterprise MFA - TFA for Drupal allows Remote Services with Stolen Credentials.This issue affects Enterprise MFA - TFA for Drupal: from 0.0.0 before 4.7.0, from 5.0.0 before 5.2.0.
AI Analysis
Technical Summary
CVE-2025-47706 is an authentication bypass vulnerability classified under CWE-294 (Authentication Bypass) affecting the Enterprise MFA - TFA module for Drupal. This vulnerability allows an attacker to bypass multi-factor authentication (MFA) protections by performing a capture-replay attack. Specifically, the flaw exists in versions prior to 4.7.0 and between 5.0.0 and before 5.2.0 of the Enterprise MFA - TFA for Drupal module. An attacker who has obtained valid user credentials can remotely exploit this vulnerability without any user interaction or prior authentication to bypass the MFA mechanism, effectively negating the additional security layer provided by two-factor authentication. The vulnerability is remotely exploitable over the network (AV:N), requires high attack complexity (AC:H), does not require privileges (PR:N), and no user interaction (UI:N). The impact is limited to low confidentiality and integrity loss, with no impact on availability. No known exploits are currently reported in the wild, and no patches are linked yet. The vulnerability undermines the security assurances of MFA, which is critical for protecting sensitive Drupal-based web applications from unauthorized access, especially in enterprise environments where Drupal is used for content management and customer-facing portals.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the security of Drupal-based web applications that rely on the Enterprise MFA - TFA module for enhanced authentication security. Since MFA is a key defense against credential theft and unauthorized access, bypassing it can lead to unauthorized data access, potential data breaches, and compromise of user accounts. This could result in exposure of personal data protected under GDPR, leading to regulatory penalties and reputational damage. Organizations in sectors such as government, finance, healthcare, and e-commerce that use Drupal for critical services are particularly at risk. The medium CVSS score reflects that while the vulnerability requires high attack complexity, the absence of user interaction and privileges needed lowers the barrier for exploitation once credentials are compromised. The lack of known exploits suggests the threat is not yet widespread, but the potential for targeted attacks remains, especially against high-value targets in Europe.
Mitigation Recommendations
European organizations should immediately audit their Drupal installations to identify if the Enterprise MFA - TFA module is in use and determine the version deployed. It is critical to upgrade affected versions to 4.7.0 or later (for versions before 5.0.0) and to 5.2.0 or later (for versions 5.0.0 and above) once patches become available. Until patches are applied, organizations should consider temporarily disabling the vulnerable MFA module or implementing additional compensating controls such as IP whitelisting, VPN access restrictions, or enhanced monitoring of authentication logs for suspicious replay attempts. Employing network-level protections like Web Application Firewalls (WAFs) with custom rules to detect replay patterns may help mitigate exploitation risk. Additionally, organizations should enforce strong password policies and monitor for credential leaks to reduce the risk of stolen credentials being used in replay attacks. Regular security assessments and penetration testing focusing on authentication mechanisms are advised to detect similar weaknesses.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Belgium, Italy
CVE-2025-47706: CWE-294 Authentication Bypass by Capture-replay in Drupal Enterprise MFA - TFA for Drupal
Description
Authentication Bypass by Capture-replay vulnerability in Drupal Enterprise MFA - TFA for Drupal allows Remote Services with Stolen Credentials.This issue affects Enterprise MFA - TFA for Drupal: from 0.0.0 before 4.7.0, from 5.0.0 before 5.2.0.
AI-Powered Analysis
Technical Analysis
CVE-2025-47706 is an authentication bypass vulnerability classified under CWE-294 (Authentication Bypass) affecting the Enterprise MFA - TFA module for Drupal. This vulnerability allows an attacker to bypass multi-factor authentication (MFA) protections by performing a capture-replay attack. Specifically, the flaw exists in versions prior to 4.7.0 and between 5.0.0 and before 5.2.0 of the Enterprise MFA - TFA for Drupal module. An attacker who has obtained valid user credentials can remotely exploit this vulnerability without any user interaction or prior authentication to bypass the MFA mechanism, effectively negating the additional security layer provided by two-factor authentication. The vulnerability is remotely exploitable over the network (AV:N), requires high attack complexity (AC:H), does not require privileges (PR:N), and no user interaction (UI:N). The impact is limited to low confidentiality and integrity loss, with no impact on availability. No known exploits are currently reported in the wild, and no patches are linked yet. The vulnerability undermines the security assurances of MFA, which is critical for protecting sensitive Drupal-based web applications from unauthorized access, especially in enterprise environments where Drupal is used for content management and customer-facing portals.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the security of Drupal-based web applications that rely on the Enterprise MFA - TFA module for enhanced authentication security. Since MFA is a key defense against credential theft and unauthorized access, bypassing it can lead to unauthorized data access, potential data breaches, and compromise of user accounts. This could result in exposure of personal data protected under GDPR, leading to regulatory penalties and reputational damage. Organizations in sectors such as government, finance, healthcare, and e-commerce that use Drupal for critical services are particularly at risk. The medium CVSS score reflects that while the vulnerability requires high attack complexity, the absence of user interaction and privileges needed lowers the barrier for exploitation once credentials are compromised. The lack of known exploits suggests the threat is not yet widespread, but the potential for targeted attacks remains, especially against high-value targets in Europe.
Mitigation Recommendations
European organizations should immediately audit their Drupal installations to identify if the Enterprise MFA - TFA module is in use and determine the version deployed. It is critical to upgrade affected versions to 4.7.0 or later (for versions before 5.0.0) and to 5.2.0 or later (for versions 5.0.0 and above) once patches become available. Until patches are applied, organizations should consider temporarily disabling the vulnerable MFA module or implementing additional compensating controls such as IP whitelisting, VPN access restrictions, or enhanced monitoring of authentication logs for suspicious replay attempts. Employing network-level protections like Web Application Firewalls (WAFs) with custom rules to detect replay patterns may help mitigate exploitation risk. Additionally, organizations should enforce strong password policies and monitor for credential leaks to reduce the risk of stolen credentials being used in replay attacks. Regular security assessments and penetration testing focusing on authentication mechanisms are advised to detect similar weaknesses.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- drupal
- Date Reserved
- 2025-05-07T16:02:44.265Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0f81484d88663aeb773
Added to database: 5/20/2025, 6:59:04 PM
Last enriched: 7/11/2025, 7:49:48 PM
Last updated: 7/30/2025, 5:11:39 AM
Views: 9
Related Threats
CVE-2025-9019: Heap-based Buffer Overflow in tcpreplay
LowCVE-2025-9017: Cross Site Scripting in PHPGurukul Zoo Management System
MediumCVE-2025-9051: SQL Injection in projectworlds Travel Management System
MediumCVE-2025-1929: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Risk Yazılım Teknolojileri Ltd. Şti. Reel Sektör Hazine ve Risk Yönetimi Yazılımı
HighCVE-2025-54475: CWE-89: Improper Neutralization of Special Elements used in an SQL Command in joomsky.com JS Jobs component for Joomla
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.