View online: https://www.drupal.org/sa-contrib-2025-061
Project: One Time Password [1] Date: 2025-May-14 Security risk: *Moderately critical* 14 ∕ 25 AC:Complex/A:None/CI:Some/II:Some/E:Theoretical/TD:Default [2] Vulnerability: Access bypass
Affected versions: <1.3.0 CVE IDs: CVE-2025-48010 Description: This module enables you to allow users to include a second authentication method in addition to password authentication.
The module doesn't sufficiently prevent one time login links from bypassing TFA.
This vulnerability is mitigated by the fact that an attacker must have access to an email account attached to a user or a valid one time password link for a user.
Solution: Install the latest version:
* If you use the One Time Password module for Drupal, upgrade to One Time Password 8.x-1.3 [3]
Reported By: * Conrad Lara (cmlara) [4]
Fixed By: * danielveza [5] * Kim Pepper (kim.pepper) [6] * Lee Rowlands (larowlan) [7] of the Drupal Security Team
Coordinated By: * Greg Knaddison (greggles) [8] of the Drupal Security Team * Juraj Nemec (poker10) [9] of the Drupal Security Team
[1] https://www.drupal.org/project/one_time_password [2] https://www.drupal.org/security-team/risk-levels [3] https://www.drupal.org/project/one_time_password/releases/8.x-1.3 [4] https://www.drupal.org/u/cmlara [5] https://www.drupal.org/u/danielveza [6] https://www.drupal.org/u/kimpepper [7] https://www.drupal.org/u/larowlan [8] https://www.drupal.org/u/greggles [9] https://www.drupal.org/u/poker10