CVE-2025-4416

7.5 HIGH

📋 TL;DR

This vulnerability in Drupal Events Log Track module allows attackers to cause excessive resource allocation without limits, potentially leading to denial of service. It affects Drupal websites using vulnerable versions of the Events Log Track module. The issue exists in the module's resource allocation mechanism which lacks proper throttling controls.

💻 Affected Systems

Products:
  • Drupal Events Log Track module
Versions: 0.0.0 to 3.1.10, 4.0.0 to 4.0.1
Operating Systems: All operating systems running Drupal
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all Drupal installations using the vulnerable module versions regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete denial of service causing website unavailability, potential resource exhaustion affecting other services on the same server, and possible system instability or crashes.

🟠

Likely Case

Degraded website performance, increased server resource consumption, and intermittent service disruptions affecting user experience.

🟢

If Mitigated

Minimal performance impact with proper resource monitoring and throttling controls in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

CWE-770 vulnerabilities typically involve simple resource exhaustion attacks that don't require complex exploitation techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.1.11 or 4.0.2

Vendor Advisory: https://www.drupal.org/sa-contrib-2025-059

Restart Required: No

Instructions:

1. Update Drupal Events Log Track module to version 3.1.11 (for 3.x branch) or 4.0.2 (for 4.x branch). 2. Clear Drupal cache. 3. Verify module functionality after update.

🔧 Temporary Workarounds

Disable Events Log Track module

all

Temporarily disable the vulnerable module until patching is possible

drush pm-disable events_log_track

Implement rate limiting

all

Add web server or application-level rate limiting for requests to the affected module

🧯 If You Can't Patch

  • Implement strict rate limiting at the web server level (nginx/apache) for all requests
  • Monitor server resource usage closely and set up alerts for abnormal consumption patterns

🔍 How to Verify

Check if Vulnerable:

Check Drupal admin interface at /admin/modules or run: drush pm-list | grep events_log_track

Check Version:

drush pml --type=module --status=enabled --fields=name,version | grep events_log_track

Verify Fix Applied:

Verify module version is 3.1.11 or higher (3.x) or 4.0.2 or higher (4.x)

📡 Detection & Monitoring

Log Indicators:

  • Unusually high resource consumption
  • Multiple rapid requests to events log endpoints
  • Server memory/CPU spikes

Network Indicators:

  • High volume of requests to /events-log or similar endpoints
  • Abnormal traffic patterns from single IPs

SIEM Query:

source="drupal.log" AND ("events_log_track" OR "events-log") AND (status=500 OR response_time>5000)

🔗 References

📤 Share & Export