View online: https://www.drupal.org/sa-contrib-2025-052
Project: Enterprise MFA - TFA for Drupal [1] Date: 2025-May-07 Security risk: *Moderately critical* 14 ∕ 25 AC:Complex/A:None/CI:Some/II:Some/E:Theoretical/TD:Default [2] Vulnerability: Access bypass
Affected versions: <4.7.0 || >=5.2.0 <5.2.0 || 5.0.* CVE IDs: CVE-2025-47706 Description: The module enables you to add second-factor authentication in addition to the default Drupal login.
The module doesn't sufficiently check whether the TOTP token is already used or not for authenticator-based second-factor methods.
This vulnerability is mitigated by the fact that an attacker must have a username, password and TOTP token generated within the last 5 minutes.
Solution: Install the latest version:
* If you use the Enterprise MFA - TFA for Drupal Drupal ^9.3, Drupal 10 and Drupal 11 upgrade to miniorange_2fa 5.2.0 [3]. * If you use the Enterprise MFA - TFA for Drupal Drupal 8, Drupal 9 and Drupal 10 upgrade to miniorange_2fa 8.x-4.7 [4].
Reported By: * Conrad Lara (cmlara) [5]
Fixed By: * Sudhanshu Dhage (sudhanshu0542) [6]
Coordinated By: * Greg Knaddison (greggles) [7] of the Drupal Security Team * Juraj Nemec (poker10) [8] of the Drupal Security Team
[1] https://www.drupal.org/project/miniorange_2fa [2] https://www.drupal.org/security-team/risk-levels [3] https://www.drupal.org/project/miniorange_2fa/releases/5.2.0 [4] https://www.drupal.org/project/miniorange_2fa/releases/8.x-4.7 [5] https://www.drupal.org/u/cmlara [6] https://www.drupal.org/u/sudhanshu0542 [7] https://www.drupal.org/u/greggles [8] https://www.drupal.org/u/poker10