CVE-2025-13982
Published: 28 January 2026
Summary
CVE-2025-13982 is a high-severity CSRF (CWE-352) vulnerability in Innoraft Login Time Restriction. Its CVSS base score is 8.1 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 6.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SC-23 (Session Authenticity) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Timely flaw remediation directly addresses this CSRF vulnerability by updating the Drupal Login Time Restriction module to version 1.0.3 or later as specified in the security advisory.
Session authenticity mechanisms, such as anti-CSRF tokens, prevent forged requests from being processed on behalf of authenticated users exploiting this vulnerability.
Information input validation ensures CSRF tokens or other authenticity checks are enforced on requests to the vulnerable module endpoints, blocking forged cross-site submissions.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
CSRF in public-facing Drupal module directly enables remote exploitation of the web application without attacker authentication.
NVD Description
Cross-Site Request Forgery (CSRF) vulnerability in Drupal Login Time Restriction allows Cross Site Request Forgery.This issue affects Login Time Restriction: from 0.0.0 before 1.0.3.
Deeper analysisAI
CVE-2025-13982 is a Cross-Site Request Forgery (CSRF) vulnerability, classified under CWE-352, in the Drupal Login Time Restriction module. This issue affects all versions of the module from 0.0.0 up to but not including 1.0.3. The vulnerability enables CSRF attacks, with a CVSS v3.1 base score of 8.1 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N), indicating network accessibility, low attack complexity, no required privileges, user interaction needed, and high impacts on confidentiality and integrity but none on availability. It was published on 2026-01-28.
An attacker can exploit this vulnerability remotely without authentication by tricking an authenticated user into visiting a malicious website or clicking a crafted link that submits a forged request to the Drupal site. Since no privileges are required on the attacker's part (PR:N) and user interaction is needed (UI:R), exploitation targets legitimate users of affected Drupal sites with the Login Time Restriction module enabled. Successful exploitation allows the attacker to perform actions on behalf of the victim, potentially leading to high confidentiality and integrity impacts, such as unauthorized access to sensitive data or modification of login time restrictions and related configurations.
The Drupal security advisory at https://www.drupal.org/sa-contrib-2025-120 provides details on mitigation. Administrators should update the Login Time Restriction module to version 1.0.3 or later, where the vulnerability is addressed.
Details
- CWE(s)