[Security-news] Enterprise MFA - TFA for Drupal - Moderately critical - Access bypass - SA-CONTRIB-2025-053

security-news at drupal.org security-news at drupal.org
Wed May 7 17:07:23 UTC 2025


View online: https://www.drupal.org/sa-contrib-2025-053

Project: Enterprise MFA - TFA for Drupal [1]
Date: 2025-May-07
Security risk: *Moderately critical* 13 ∕ 25
AC:Complex/A:User/CI:Some/II:Some/E:Theoretical/TD:All [2]
Vulnerability: Access bypass

Affected versions: <4.7.0 || >=5.2.0 <5.2.0 || 5.0.*
CVE IDs: CVE-2025-47707
Description: 
The module enables you to add second-factor authentication in addition to the
default Drupal login.

The module doesn't invoke two factor authentication (2FA) for the password
reset option.

This vulnerability is mitigated by the fact that an attacker must have access
to the password reset link.

Solution: 
Install the latest version:

  * If you use the Enterprise MFA - TFA for Drupal Drupal ^9.3,  Drupal 10 and
    Drupal 11 upgrade to miniorange_2fa 5.2.0 [3].
  * If you use the Enterprise MFA - TFA for Drupal Drupal 8, Drupal 9 and
    Drupal 10 upgrade to miniorange_2fa 8.x-4.7 [4].

Reported By: 
  * Conrad Lara (cmlara) [5]

Fixed By: 
  * Sudhanshu Dhage (sudhanshu0542) [6]

Coordinated By: 
  * Greg Knaddison (greggles) [7] of the Drupal Security Team
  * Juraj Nemec (poker10) [8] of the Drupal Security Team


[1] https://www.drupal.org/project/miniorange_2fa
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/project/miniorange_2fa/releases/5.2.0
[4] https://www.drupal.org/project/miniorange_2fa/releases/8.x-4.7
[5] https://www.drupal.org/u/cmlara
[6] https://www.drupal.org/u/sudhanshu0542
[7] https://www.drupal.org/u/greggles
[8] https://www.drupal.org/u/poker10



More information about the Security-news mailing list