[Security-news] Enterprise MFA - TFA for Drupal - Critical - Access bypass - SA-CONTRIB-2025-056
security-news at drupal.org
security-news at drupal.org
Wed May 7 17:08:32 UTC 2025
View online: https://www.drupal.org/sa-contrib-2025-056
Project: Enterprise MFA - TFA for Drupal [1]
Date: 2025-May-07
Security risk: *Critical* 15 ∕ 25
AC:Complex/A:None/CI:Some/II:Some/E:Theoretical/TD:All [2]
Vulnerability: Access bypass
Affected versions: <4.7.0 || >=5.2.0 <5.2.0 || 5.0.*
CVE IDs: CVE-2025-47710
Description:
The module enables you to add second-factor authentication in addition to the
default Drupal login.
The module does not sufficiently ensure that known login routes are
protected.
This vulnerability is mitigated by the fact that an attacker must obtain the
user's username and password.
Solution:
Install the latest version:
* If you use the Enterprise MFA - TFA for Drupal Drupal ^9.3, Drupal 10 and
Drupal 11 upgrade to miniorange_2fa 5.2.0 [3].
* If you use the Enterprise MFA - TFA for Drupal Drupal 8, Drupal 9 and
Drupal 10 upgrade to miniorange_2fa 8.x-4.7 [4].
Reported By:
* Conrad Lara (cmlara) [5]
Fixed By:
* Sudhanshu Dhage (sudhanshu0542) [6]
Coordinated By:
* Greg Knaddison (greggles) [7] of the Drupal Security Team
* Juraj Nemec (poker10) [8] of the Drupal Security Team
[1] https://www.drupal.org/project/miniorange_2fa
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/project/miniorange_2fa/releases/5.2.0
[4] https://www.drupal.org/project/miniorange_2fa/releases/8.x-4.7
[5] https://www.drupal.org/u/cmlara
[6] https://www.drupal.org/u/sudhanshu0542
[7] https://www.drupal.org/u/greggles
[8] https://www.drupal.org/u/poker10
More information about the Security-news
mailing list