CVE-2025-13985

5.3 MEDIUM

📋 TL;DR

This CVE describes an incorrect authorization vulnerability in Drupal's Entity Share module that allows forceful browsing (unauthorized access to restricted content). Attackers can bypass intended access controls to view or manipulate content they shouldn't have permission to access. This affects all Drupal sites using vulnerable versions of the Entity Share module.

💻 Affected Systems

Products:
  • Drupal Entity Share module
Versions: from 0.0.0 before 3.13.0
Operating Systems: All operating systems running Drupal
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Drupal sites with the Entity Share module installed and enabled. The vulnerability exists in the module's authorization logic.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain unauthorized access to sensitive content, potentially exposing confidential data, intellectual property, or user information that should be protected by access controls.

🟠

Likely Case

Unauthorized users access content intended for specific roles or users, potentially exposing internal documents, draft content, or restricted site areas.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to unauthorized viewing of non-critical content with audit trails for investigation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires understanding of Drupal's entity structure and access patterns. The vulnerability is in authorization logic, making it relatively straightforward to exploit once identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.13.0

Vendor Advisory: https://www.drupal.org/sa-contrib-2025-123

Restart Required: No

Instructions:

1. Update the Entity Share module to version 3.13.0 or later via Drupal's update manager or Composer. 2. Clear Drupal caches after update. 3. Verify module functionality post-update.

🔧 Temporary Workarounds

Disable Entity Share Module

all

Temporarily disable the vulnerable module until patching is possible

drush pm:disable entity_share

Implement Additional Access Controls

all

Add custom access checks or permissions to restrict entity access

🧯 If You Can't Patch

  • Implement strict network segmentation to limit access to Drupal administration interfaces
  • Enable detailed audit logging for entity access attempts and monitor for suspicious patterns

🔍 How to Verify

Check if Vulnerable:

Check Entity Share module version in Drupal's Extend page or via 'drush pm:list | grep entity_share'

Check Version:

drush pm:list --fields=name,version | grep entity_share

Verify Fix Applied:

Confirm Entity Share module version is 3.13.0 or higher and test access controls for previously vulnerable entities

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed access attempts to restricted entities followed by successful access
  • Access to entity endpoints by users without proper permissions

Network Indicators:

  • Unusual patterns of requests to entity endpoints
  • Requests bypassing normal authentication flows

SIEM Query:

source="drupal" ("entity_share" OR "entity access") AND (status=200 OR status=403) | stats count by user, path

🔗 References

📤 Share & Export