[Security-news] Two-factor Authentication (TFA) - Less critical - Access bypass - SA-CONTRIB-2025-085

security-news at drupal.org security-news at drupal.org
Wed Jul 2 17:37:04 UTC 2025


View online: https://www.drupal.org/sa-contrib-2025-085

Project: Two-factor Authentication (TFA) [1]
Date: 2025-July-02
Security risk: *Less critical* 9 ∕ 25
AC:Basic/A:Admin/CI:Some/II:None/E:Theoretical/TD:Default [2]
Vulnerability: Access bypass

Affected versions: <1.11.0
CVE IDs: CVE-2025-7030
Description: 
This module enables you to allow and/or require a second authentication
method in addition to password authentication.

The module does not sufficiently ensure that users with enhanced privileges
are prevented from viewing recovery codes of other users.

This vulnerability is mitigated by the fact that an attacker must have a role
with the /Administer TFA for other users/ permission.

Solution: 
Install the latest version:

  * If you use the Two-factor Authentication (TFA) module for Drupal 8.x,
    upgrade to Two-factor Authentication (TFA) 8.x-1.11 [3].

Reported By: 
  * Conrad Lara (cmlara) [4]

Fixed By: 
  * Conrad Lara (cmlara) [5]

Coordinated By: 
  * cilefen  (cilefen) [6] of the Drupal Security Team
  * Dan Smith (galooph) [7] of the Drupal Security Team
  * Greg Knaddison (greggles) [8] of the Drupal Security Team
  * Jess  (xjm) [9] of the Drupal Security Team


[1] https://www.drupal.org/project/tfa
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/project/tfa/releases/8.x-1.11
[4] https://www.drupal.org/u/cmlara
[5] https://www.drupal.org/u/cmlara
[6] https://www.drupal.org/u/cilefen
[7] https://www.drupal.org/u/galooph
[8] https://www.drupal.org/u/greggles
[9] https://www.drupal.org/u/xjm



More information about the Security-news mailing list