View online: https://www.drupal.org/sa-contrib-2025-063
Project: One Time Password [1] Date: 2025-May-14 Security risk: *Moderately critical* 14 ∕ 25 AC:Complex/A:None/CI:Some/II:Some/E:Theoretical/TD:Default [2] Vulnerability: Access bypass
Affected versions: <1.3.0 CVE IDs: CVE-2025-48012 Description: This module enables you to allow users to include a second authentication method in addition to password authentication.
The module doesn't sufficiently prevent the same TFA token within a 30 second window.
This vulnerability is mitigated by the fact that an attacker must obtain a valid username/password and second factor.
Solution: Install the latest version:
* If you use the One Time Password module for Drupal, upgrade to One Time Password 8.x-1.3 [3]
Reported By: * Conrad Lara (cmlara) [4]
Fixed By: * danielveza [5] * Lee Rowlands (larowlan) [6] of the Drupal Security Team * Ivo Van Geertruyen (mr.baileys) [7] of the Drupal Security Team
Coordinated By: * Greg Knaddison (greggles) [8] of the Drupal Security Team * Juraj Nemec (poker10) [9] of the Drupal Security Team
[1] https://www.drupal.org/project/one_time_password [2] https://www.drupal.org/security-team/risk-levels [3] https://www.drupal.org/project/one_time_password/releases/8.x-1.3 [4] https://www.drupal.org/u/cmlara [5] https://www.drupal.org/u/danielveza [6] https://www.drupal.org/u/larowlan [7] https://www.drupal.org/u/mrbaileys [8] https://www.drupal.org/u/greggles [9] https://www.drupal.org/u/poker10