Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9549: CWE-862 Missing Authorization in Drupal Facets

0
Medium
VulnerabilityCVE-2025-9549cvecve-2025-9549cwe-862
Published: Fri Oct 10 2025 (10/10/2025, 22:24:16 UTC)
Source: CVE Database V5
Vendor/Project: Drupal
Product: Facets

Description

Missing Authorization vulnerability in Drupal Facets allows Forceful Browsing.This issue affects Facets: from 0.0.0 before 2.0.10, from 3.0.0 before 3.0.1.

AI-Powered Analysis

AILast updated: 10/18/2025, 03:58:02 UTC

Technical Analysis

CVE-2025-9549 is a missing authorization vulnerability classified under CWE-862 found in the Drupal Facets module, which is used to create faceted search interfaces on Drupal websites. The vulnerability affects Facets versions prior to 2.0.10 and 3.0.1. It allows unauthenticated attackers to bypass authorization controls and perform forceful browsing, meaning they can access facet data or functionality that should be restricted. This can lead to unauthorized disclosure of sensitive information or manipulation of facet filters, potentially undermining data confidentiality and integrity. The CVSS v3.1 base score is 6.5, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impacts on confidentiality and integrity but not availability. The vulnerability was reserved in August 2025 and published in October 2025, with no known exploits in the wild at the time of reporting. The Facets module is widely used in Drupal-powered websites, including those of governments, educational institutions, and media organizations, which often handle sensitive or regulated data. Exploitation does not require authentication or user interaction, increasing the risk of automated or opportunistic attacks. The absence of patch links suggests that affected organizations must rely on official Drupal updates or advisories to remediate the issue. Overall, this vulnerability represents a moderate risk that could lead to unauthorized data exposure if left unpatched.

Potential Impact

For European organizations, the impact of CVE-2025-9549 can be significant, especially for those operating Drupal-based websites with faceted search features. Unauthorized access to facet data could expose sensitive or regulated information, potentially violating GDPR and other data protection regulations. This could lead to reputational damage, regulatory fines, and loss of user trust. The integrity of search results and filtering mechanisms may also be compromised, affecting user experience and data reliability. Since the vulnerability requires no authentication or user interaction, it can be exploited remotely and at scale, increasing the likelihood of data leakage. Sectors such as government, education, media, and e-commerce in Europe that rely on Drupal Facets are particularly vulnerable. The medium CVSS score reflects moderate confidentiality and integrity impacts but no direct availability disruption, meaning service continuity is unlikely to be affected. However, the breach of access controls can have cascading effects on compliance and operational security.

Mitigation Recommendations

European organizations should immediately verify their Drupal Facets module version and upgrade to 2.0.10 or 3.0.1 or later, where the vulnerability is fixed. If immediate patching is not feasible, implement web application firewall (WAF) rules to detect and block forceful browsing attempts targeting facet endpoints. Conduct a thorough audit of facet access controls and ensure that authorization checks are enforced consistently across all facet-related functionalities. Monitor web server and application logs for unusual access patterns indicative of unauthorized browsing or data scraping. Limit exposure of facet data by restricting access to authenticated users where possible and applying the principle of least privilege. Engage with Drupal security advisories and community channels to stay informed about patches and exploit developments. Additionally, perform regular security assessments and penetration tests focusing on authorization mechanisms within Drupal modules. Document and review incident response plans to address potential data exposure incidents swiftly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
drupal
Date Reserved
2025-08-27T16:08:30.544Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68e98a03a6e766b7172b969a

Added to database: 10/10/2025, 10:34:43 PM

Last enriched: 10/18/2025, 3:58:02 AM

Last updated: 11/28/2025, 5:49:40 PM

Views: 60

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats