View online: https://www.drupal.org/sa-contrib-2025-085
Project: Two-factor Authentication (TFA) [1] Date: 2025-July-02 Security risk: *Less critical* 9 ∕ 25 AC:Basic/A:Admin/CI:Some/II:None/E:Theoretical/TD:Default [2] Vulnerability: Access bypass
Affected versions: <1.11.0 CVE IDs: CVE-2025-7030 Description: This module enables you to allow and/or require a second authentication method in addition to password authentication.
The module does not sufficiently ensure that users with enhanced privileges are prevented from viewing recovery codes of other users.
This vulnerability is mitigated by the fact that an attacker must have a role with the /Administer TFA for other users/ permission.
Solution: Install the latest version:
* If you use the Two-factor Authentication (TFA) module for Drupal 8.x, upgrade to Two-factor Authentication (TFA) 8.x-1.11 [3].
Reported By: * Conrad Lara (cmlara) [4]
Fixed By: * Conrad Lara (cmlara) [5]
Coordinated By: * cilefen (cilefen) [6] of the Drupal Security Team * Dan Smith (galooph) [7] of the Drupal Security Team * Greg Knaddison (greggles) [8] of the Drupal Security Team * Jess (xjm) [9] of the Drupal Security Team
[1] https://www.drupal.org/project/tfa [2] https://www.drupal.org/security-team/risk-levels [3] https://www.drupal.org/project/tfa/releases/8.x-1.11 [4] https://www.drupal.org/u/cmlara [5] https://www.drupal.org/u/cmlara [6] https://www.drupal.org/u/cilefen [7] https://www.drupal.org/u/galooph [8] https://www.drupal.org/u/greggles [9] https://www.drupal.org/u/xjm