CVE-2025-14840

7.5 HIGH

📋 TL;DR

This vulnerability in Drupal HTTP Client Manager allows attackers to bypass access controls through forceful browsing, potentially accessing restricted administrative functions or data. It affects Drupal sites using vulnerable versions of the HTTP Client Manager module.

💻 Affected Systems

Products:
  • Drupal HTTP Client Manager
Versions: 0.0.0 to 9.3.12, 10.0.0 to 10.0.1, 11.0.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Drupal sites with HTTP Client Manager module installed and enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could gain administrative access to Drupal sites, modify content, install malicious modules, or exfiltrate sensitive data.

🟠

Likely Case

Unauthorized access to restricted administrative interfaces or data exposure through HTTP parameter manipulation.

🟢

If Mitigated

Limited impact with proper access controls, but still exposes attack surface for further exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Forceful browsing typically requires minimal technical skill but may need some understanding of Drupal's URL structure.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 9.3.13, 10.0.2, 11.0.1

Vendor Advisory: https://www.drupal.org/sa-contrib-2025-126

Restart Required: No

Instructions:

1. Update HTTP Client Manager module via Drupal admin interface or Composer. 2. For Composer: composer update drupal/http_client_manager. 3. Clear Drupal caches after update.

🔧 Temporary Workarounds

Disable HTTP Client Manager Module

all

Temporarily disable the vulnerable module until patching is possible

drush pm:disable http_client_manager

Restrict Access via .htaccess

linux

Add access restrictions to HTTP Client Manager paths

Add 'Deny from all' to .htaccess in module directory

🧯 If You Can't Patch

  • Implement strict access controls and authentication for all administrative interfaces
  • Deploy web application firewall rules to detect and block forceful browsing attempts

🔍 How to Verify

Check if Vulnerable:

Check installed module version via Drupal admin at /admin/modules or using drush: drush pm:list | grep http_client_manager

Check Version:

drush pm:list --fields=name,version | grep http_client_manager

Verify Fix Applied:

Confirm module version is 9.3.13+, 10.0.2+, or 11.0.1+

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to HTTP Client Manager endpoints
  • Multiple 403/404 errors followed by successful 200 responses

Network Indicators:

  • HTTP requests with unusual parameters to module-specific paths
  • Brute-force style access attempts to administrative URLs

SIEM Query:

source="drupal_access.log" AND (uri="/admin/config/services/http-client-manager" OR uri CONTAINS "http_client_manager") AND status=200

🔗 References

📤 Share & Export