View online: https://www.drupal.org/sa-contrib-2025-088
Project: Mail Login [1] Date: 2025-July-09 Security risk: *Critical* 15 ∕ 25 AC:Complex/A:None/CI:Some/II:Some/E:Theoretical/TD:All [2] Vulnerability: Access bypass
Affected versions: >3.0.0 <3.2.0 || >=4.0.0 <4.2.0 CVE IDs: CVE-2025-7393 Description: This module enables users to login by email address with the minimal configurations.
The module included some protection against brute force attacks on the login form, however they were incomplete. An attacker could bypass the brute force protection allowing them to potentially gain access to an account.
Solution: Install the latest version:
* If you use the mail_login 3.x, upgrade to Mail Login 3.2.0 [3] * If you use the mail_login 4.x, upgrade to Mail Login 4.2.0 [4]
Reported By: * Ryugo Kinoshita (dc-kinoshita) [5]
Fixed By: * Damien McKenna (damienmckenna) [6] of the Drupal Security Team * Mohammad AlQanneh (mqanneh) [7]
Coordinated By: * Greg Knaddison (greggles) [8] of the Drupal Security Team
[1] https://www.drupal.org/project/mail_login [2] https://www.drupal.org/security-team/risk-levels [3] https://www.drupal.org/project/mail_login/releases/3.2.0 [4] https://www.drupal.org/project/mail_login/releases/4.2.0 [5] https://www.drupal.org/u/dc-kinoshita [6] https://www.drupal.org/u/damienmckenna [7] https://www.drupal.org/u/mqanneh [8] https://www.drupal.org/u/greggles