[Security-news] Two-factor Authentication (TFA) - Less critical - Access bypass - SA-CONTRIB-2025-085
security-news at drupal.org
security-news at drupal.org
Wed Jul 2 17:37:04 UTC 2025
View online: https://www.drupal.org/sa-contrib-2025-085
Project: Two-factor Authentication (TFA) [1]
Date: 2025-July-02
Security risk: *Less critical* 9 ∕ 25
AC:Basic/A:Admin/CI:Some/II:None/E:Theoretical/TD:Default [2]
Vulnerability: Access bypass
Affected versions: <1.11.0
CVE IDs: CVE-2025-7030
Description:
This module enables you to allow and/or require a second authentication
method in addition to password authentication.
The module does not sufficiently ensure that users with enhanced privileges
are prevented from viewing recovery codes of other users.
This vulnerability is mitigated by the fact that an attacker must have a role
with the /Administer TFA for other users/ permission.
Solution:
Install the latest version:
* If you use the Two-factor Authentication (TFA) module for Drupal 8.x,
upgrade to Two-factor Authentication (TFA) 8.x-1.11 [3].
Reported By:
* Conrad Lara (cmlara) [4]
Fixed By:
* Conrad Lara (cmlara) [5]
Coordinated By:
* cilefen (cilefen) [6] of the Drupal Security Team
* Dan Smith (galooph) [7] of the Drupal Security Team
* Greg Knaddison (greggles) [8] of the Drupal Security Team
* Jess (xjm) [9] of the Drupal Security Team
[1] https://www.drupal.org/project/tfa
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/project/tfa/releases/8.x-1.11
[4] https://www.drupal.org/u/cmlara
[5] https://www.drupal.org/u/cmlara
[6] https://www.drupal.org/u/cilefen
[7] https://www.drupal.org/u/galooph
[8] https://www.drupal.org/u/greggles
[9] https://www.drupal.org/u/xjm
More information about the Security-news
mailing list