Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-31680— Matomo Analytics - Moderately critical - Cross site request forgery - SA-CONTRIB-2025-008

EPSS 0.47% · P64
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-31680

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Matomo Analytics - Moderately critical - Cross site request forgery - SA-CONTRIB-2025-008
Source: NVD (National Vulnerability Database)
Vulnerability Description
Cross-Site Request Forgery (CSRF) vulnerability in Drupal Matomo Analytics allows Cross Site Request Forgery.This issue affects Matomo Analytics: from 0.0.0 before 1.24.0.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
跨站请求伪造(CSRF)
Source: NVD (National Vulnerability Database)
Vulnerability Title
Drupal Matomo Analytics 跨站请求伪造漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Drupal Matomo Analytics是Drupal社区的一个用于在 Drupal 网站中集成 Matomo(开源网站分析平台)以跟踪和分析用户行为的模块。 Drupal Matomo Analytics 1.24.0之前版本存在跨站请求伪造漏洞,该漏洞源于容易受到跨站请求伪造攻击。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
DrupalMatomo Analytics 0.0.0 ~ 1.24.0 -

II. Public POCs for CVE-2025-31680

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-31680

登录查看更多情报信息。

Same Patch Batch · Drupal · 2025-03-31 · 30 CVEs total

CVE-2025-31691OAuth2 Server - Moderately critical - Access bypass - SA-CONTRIB-2025-020
CVE-2025-3062Drupal Admin LTE theme - Critical - Unsupported - SA-CONTRIB-2025-010
CVE-2025-3059Profile Private - Critical - Unsupported - SA-CONTRIB-2025-002
CVE-2025-3061Material Admin - Critical - Unsupported - SA-CONTRIB-2025-006
CVE-2025-3060Flattern – Multipurpose Bootstrap Business Profile - Critical - Unsupported - SA-CONTRIB-2
CVE-2025-31695Link field display mode formatter - Moderately critical - Cross site scripting - SA-CONTRI
CVE-2025-31690Cache Utility - Moderately critical - Cross Site Request Forgery - SA-CONTRIB-2025-019
CVE-2025-31688Configuration Split - Moderately critical - Cross Site Request Forgery - SA-CONTRIB-2025-0
CVE-2025-31687SpamSpan filter - Moderately critical - Cross Site Scripting - SA-CONTRIB-2025-016
CVE-2025-31697Formatter Suite - Moderately critical - Cross site scripting - SA-CONTRIB-2025-026
CVE-2025-31694Two-factor Authentication (TFA) - Moderately critical - Access bypass - SA-CONTRIB-2025-02
CVE-2025-31692AI (Artificial Intelligence) - Critical - Remote Code Execution - SA-CONTRIB-2025-021
CVE-2025-31689General Data Protection Regulation - Moderately critical - Cross Site Request Forgery - SA
CVE-2025-31693AI (Artificial Intelligence) - Moderately critical - Gadget Chain - SA-CONTRIB-2025-022
CVE-2025-31696RapiDoc OAS Field Formatter - Moderately critical - Cross site scripting - SA-CONTRIB-2025
CVE-2025-3057Drupal core - Critical - Cross site scripting - SA-CORE-2025-001
CVE-2025-31685Open Social - Moderately critical - Access bypass - SA-CONTRIB-2025-014
CVE-2025-31681Authenticator Login - Critical - Access bypass - SA-CONTRIB-2025-009
CVE-2025-31683Google Tag - Moderately critical - Cross Site Request Forgery - SA-CONTRIB-2025-012
CVE-2025-31684OAuth2 Client - Moderately critical - Cross Site Request Forgery - SA-CONTRIB-2025-013

Showing top 20 of 30 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2025-31680

No comments yet


Leave a comment