Skip to main content

CVE-2025-48448: CWE-770 Allocation of Resources Without Limits or Throttling in Drupal Admin Audit Trail

Medium
VulnerabilityCVE-2025-48448cvecve-2025-48448cwe-770
Published: Wed Jun 11 2025 (06/11/2025, 14:36:15 UTC)
Source: CVE Database V5
Vendor/Project: Drupal
Product: Admin Audit Trail

Description

Allocation of Resources Without Limits or Throttling vulnerability in Drupal Admin Audit Trail allows Excessive Allocation.This issue affects Admin Audit Trail: from 0.0.0 before 1.0.5.

AI-Powered Analysis

AILast updated: 07/12/2025, 07:46:41 UTC

Technical Analysis

CVE-2025-48448 is a vulnerability identified in the Drupal Admin Audit Trail module, specifically affecting versions prior to 1.0.5 (including 0.0.0). The vulnerability is classified under CWE-770, which pertains to the allocation of resources without limits or throttling. This means that the module improperly manages resource allocation, allowing an attacker to trigger excessive consumption of system resources. The vulnerability is exploitable remotely (AV:N), requires low attack complexity (AC:L), does not require privileges (PR:N), but does require user interaction (UI:R). The scope is unchanged (S:U), and the impact is primarily on confidentiality (C:H), with no impact on integrity (I:N) or availability (A:N). The CVSS v3.1 base score is 6.5, indicating a medium severity level. The vulnerability could allow an attacker to cause excessive resource allocation, potentially leading to information disclosure or leakage due to improper handling of audit trail data. However, there are no known exploits in the wild at this time, and no patches have been linked yet. The vulnerability affects the Admin Audit Trail module, which is used to monitor and log administrative actions within Drupal, a widely used content management system (CMS). Improper resource management in this context could expose sensitive administrative data or metadata, thereby compromising confidentiality.

Potential Impact

For European organizations using Drupal with the Admin Audit Trail module, this vulnerability poses a risk primarily to the confidentiality of administrative audit data. Since the module logs sensitive administrative actions, excessive resource allocation could lead to unintended exposure of this data or system instability that indirectly compromises data confidentiality. Organizations relying on Drupal for critical websites, intranets, or portals may face risks of sensitive information leakage, which could be exploited for further attacks or espionage. Given Drupal's popularity in government, education, and enterprise sectors across Europe, the vulnerability could affect a broad range of organizations. The lack of impact on integrity and availability reduces the risk of direct service disruption or data tampering, but confidentiality breaches can still have serious compliance and reputational consequences, especially under GDPR regulations. The requirement for user interaction limits the ease of exploitation but does not eliminate risk, particularly in environments where administrative users might be targeted with phishing or social engineering attacks to trigger the vulnerability.

Mitigation Recommendations

European organizations should prioritize updating the Admin Audit Trail module to version 1.0.5 or later once it becomes available, as this will likely contain the fix for the vulnerability. Until a patch is released, organizations should implement strict access controls to limit who can interact with the Admin Audit Trail functionality, reducing the risk of exploitation via user interaction. Monitoring and logging should be enhanced to detect unusual resource consumption patterns that may indicate exploitation attempts. Additionally, organizations should conduct user awareness training focused on phishing and social engineering risks to prevent attackers from leveraging user interaction requirements. Network-level protections such as web application firewalls (WAFs) can be configured to detect and block suspicious requests targeting the Admin Audit Trail endpoints. Finally, regular security audits and vulnerability assessments should be conducted to ensure no other related weaknesses exist in the Drupal environment.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
drupal
Date Reserved
2025-05-21T16:25:07.435Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6849989023110031d4102827

Added to database: 6/11/2025, 2:54:08 PM

Last enriched: 7/12/2025, 7:46:41 AM

Last updated: 8/18/2025, 11:33:57 PM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats