CVE-2025-13083

3.7 LOW

📋 TL;DR

This vulnerability in Drupal core allows attackers to exploit web browser caching to access sensitive information that should be protected. It affects Drupal sites with misconfigured access controls, potentially exposing private data to unauthorized users. All Drupal installations within the affected version ranges are vulnerable.

💻 Affected Systems

Products:
  • Drupal core
Versions: Drupal 7.0-7.103, 8.0.0-10.4.8, 10.5.0-10.5.5, 11.0.0-11.1.8, 11.2.0-11.2.7
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default Drupal configurations when access controls are incorrectly implemented or bypassed.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Sensitive user data (personal information, private content, administrative details) cached in browsers becomes accessible to attackers, leading to data breaches and privacy violations.

🟠

Likely Case

Unauthorized users accessing cached sensitive pages or content that should require authentication, potentially exposing user-specific data.

🟢

If Mitigated

With proper access controls and cache headers, the risk is minimal as sensitive content won't be cached or will have appropriate security headers.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires specific conditions where sensitive content is cached and access controls are bypassed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Drupal 7.103, 10.4.9, 10.5.6, 11.1.9, 11.2.8

Vendor Advisory: https://www.drupal.org/sa-core-2025-008

Restart Required: No

Instructions:

1. Update Drupal core to the patched version. 2. For Drupal 7: Update to 7.103. 3. For Drupal 8-10: Update to 10.4.9 or 10.5.6. 4. For Drupal 11: Update to 11.1.9 or 11.2.8. 5. Clear all caches after update.

🔧 Temporary Workarounds

Implement proper cache control headers

all

Add Cache-Control headers to prevent sensitive content from being cached by browsers

Add appropriate Cache-Control headers in .htaccess or server configuration for sensitive pages

Review and fix access control configurations

all

Audit and correct any misconfigured access controls that might allow unauthorized access to sensitive content

Review Drupal permissions, content access modules, and custom access logic

🧯 If You Can't Patch

  • Implement strict cache control headers for all sensitive content
  • Conduct security audit of all access control configurations and permissions

🔍 How to Verify

Check if Vulnerable:

Check Drupal version via admin/reports/status or by examining CHANGELOG.txt file

Check Version:

drush status | grep 'Drupal version' or check admin/reports/status page

Verify Fix Applied:

Confirm Drupal version is updated to patched version and test that sensitive content no longer gets cached

📡 Detection & Monitoring

Log Indicators:

  • Multiple unauthorized access attempts to sensitive URLs
  • Unusual patterns of cache hits on protected content

Network Indicators:

  • Requests bypassing authentication to access cached sensitive content
  • Browser cache headers showing sensitive content being cached

SIEM Query:

web_access_logs WHERE (url CONTAINS '/admin' OR url CONTAINS '/user') AND response_code = 200 AND referrer IS NULL

🔗 References

📤 Share & Export