CVE-2025-31694
Published: 31 March 2025
Summary
CVE-2025-31694 is a high-severity Authentication Bypass Using an Alternate Path or Channel (CWE-288) vulnerability in Two-Factor Authentication Project Two-Factor Authentication. Its CVSS base score is 8.1 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 38.5% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Enforces approved authorizations for access to system resources, directly preventing forceful browsing bypasses of authorization checks in the Drupal TFA module.
Requires timely flaw remediation by patching the vulnerable TFA module to version 1.10.0 or later, eliminating the incorrect authorization vulnerability.
Limits potential damage from successful forceful browsing exploitation by employing least privilege for accounts and functions in the Drupal system.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
CVE-2025-31694 is an access bypass vulnerability in Drupal's Two-factor Authentication module via forceful browsing of overridden login routes, enabling exploitation of a public-facing web application.
NVD Description
Incorrect Authorization vulnerability in Drupal Two-factor Authentication (TFA) allows Forceful Browsing.This issue affects Two-factor Authentication (TFA): from 0.0.0 before 1.10.0.
Deeper analysisAI
CVE-2025-31694 is an Incorrect Authorization vulnerability (CWE-288) in the Drupal Two-factor Authentication (TFA) module that enables forceful browsing. This flaw affects all versions of the TFA module from 0.0.0 up to but not including 1.10.0. Published on March 31, 2025, it carries a CVSS v3.1 base score of 8.1 (High), reflecting network accessibility with high attack complexity but no privileges or user interaction required.
Remote, unauthenticated attackers can exploit this vulnerability over the network by engaging in forceful browsing to bypass authorization controls in the TFA module. Successful exploitation grants high-impact access, potentially leading to unauthorized confidentiality disclosures, integrity modifications, and availability disruptions within affected Drupal sites using vulnerable TFA versions.
The Drupal Security Advisory SA-CONTRIB-2025-023 at https://www.drupal.org/sa-contrib-2025-023 details mitigation steps, with the fix implemented in TFA version 1.10.0; administrators should upgrade to this or later versions to remediate the issue.
Details
- CWE(s)