CVE-2025-8995

9.8 CRITICAL

📋 TL;DR

This vulnerability allows attackers to bypass authentication in Drupal sites using the Authenticator Login module by exploiting an alternate path or channel. It affects all Drupal installations running Authenticator Login module versions from initial release up to 2.1.4. Attackers could gain unauthorized access to protected areas without valid credentials.

💻 Affected Systems

Products:
  • Drupal Authenticator Login module
Versions: 0.0.0 through 2.1.3
Operating Systems: All platforms running Drupal
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects sites with the Authenticator Login module enabled. Drupal core is not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete site compromise allowing attackers to access administrative functions, modify content, install malicious modules, and potentially pivot to other systems.

🟠

Likely Case

Unauthorized access to protected content areas, user data exposure, and privilege escalation for authenticated users.

🟢

If Mitigated

Limited impact if strong network segmentation, web application firewalls, and additional authentication layers are in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

CWE-288 indicates authentication bypass via alternate path/channel, suggesting relatively straightforward exploitation once details are known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.1.4

Vendor Advisory: https://www.drupal.org/sa-contrib-2025-096

Restart Required: No

Instructions:

1. Log into Drupal admin panel. 2. Navigate to Extend > Update. 3. Update Authenticator Login module to version 2.1.4. 4. Clear Drupal cache via Configuration > Development > Performance > Clear all caches.

🔧 Temporary Workarounds

Disable Authenticator Login Module

all

Temporarily disable the vulnerable module until patching is possible

drush pm-disable authenticator_login

Web Application Firewall Rule

all

Block suspicious authentication bypass attempts at the WAF layer

🧯 If You Can't Patch

  • Implement IP-based access restrictions to admin/login paths
  • Enable additional authentication factors for administrative users

🔍 How to Verify

Check if Vulnerable:

Check module version at /admin/modules or run: drush pm-list | grep authenticator_login

Check Version:

drush pml --type=module --status=enabled --fields=name,version | grep authenticator_login

Verify Fix Applied:

Confirm module version shows 2.1.4 or higher

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication patterns
  • Access to protected paths without prior login events
  • Multiple failed login attempts followed by successful access

Network Indicators:

  • HTTP requests to authentication endpoints with unusual parameters
  • Traffic patterns suggesting authentication bypass

SIEM Query:

source="drupal_access.log" (status=200 OR status=302) AND (uri_path="/admin/*" OR uri_path="/user/*") AND NOT (user_agent contains "bot" OR user_agent contains "crawl") | stats count by src_ip, uri_path

🔗 References

📤 Share & Export