Cyber Posture

CVE-2025-31694

High

Published: 31 March 2025

Published
31 March 2025
Modified
02 September 2025
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0041 61.5th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-31694 is a high-severity Authentication Bypass Using an Alternate Path or Channel (CWE-288) vulnerability in Two-Factor Authentication Project Two-Factor Authentication. Its CVSS base score is 8.1 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 38.5% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Enforces approved authorizations for access to system resources, directly preventing forceful browsing bypasses of authorization checks in the Drupal TFA module.

prevent

Requires timely flaw remediation by patching the vulnerable TFA module to version 1.10.0 or later, eliminating the incorrect authorization vulnerability.

prevent

Limits potential damage from successful forceful browsing exploitation by employing least privilege for accounts and functions in the Drupal system.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

CVE-2025-31694 is an access bypass vulnerability in Drupal's Two-factor Authentication module via forceful browsing of overridden login routes, enabling exploitation of a public-facing web application.

NVD Description

Incorrect Authorization vulnerability in Drupal Two-factor Authentication (TFA) allows Forceful Browsing.This issue affects Two-factor Authentication (TFA): from 0.0.0 before 1.10.0.

Deeper analysisAI

CVE-2025-31694 is an Incorrect Authorization vulnerability (CWE-288) in the Drupal Two-factor Authentication (TFA) module that enables forceful browsing. This flaw affects all versions of the TFA module from 0.0.0 up to but not including 1.10.0. Published on March 31, 2025, it carries a CVSS v3.1 base score of 8.1 (High), reflecting network accessibility with high attack complexity but no privileges or user interaction required.

Remote, unauthenticated attackers can exploit this vulnerability over the network by engaging in forceful browsing to bypass authorization controls in the TFA module. Successful exploitation grants high-impact access, potentially leading to unauthorized confidentiality disclosures, integrity modifications, and availability disruptions within affected Drupal sites using vulnerable TFA versions.

The Drupal Security Advisory SA-CONTRIB-2025-023 at https://www.drupal.org/sa-contrib-2025-023 details mitigation steps, with the fix implemented in TFA version 1.10.0; administrators should upgrade to this or later versions to remediate the issue.

Details

CWE(s)

Affected Products

two-factor authentication project
two-factor authentication
≤ 8.x-1.10

CVEs Like This One

CVE-2024-13279Same product: Two-Factor Authentication Project Two-Factor Authentication
CVE-2024-13239Same product: Two-Factor Authentication Project Two-Factor Authentication
CVE-2026-25471Shared CWE-288
CVE-2026-40630Shared CWE-288
CVE-2025-67039Shared CWE-288
CVE-2025-13539Shared CWE-288
CVE-2026-31151Shared CWE-288
CVE-2025-64236Shared CWE-288
CVE-2025-27129Shared CWE-288
CVE-2025-5955Shared CWE-288

References