Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-31694— Two-factor Authentication (TFA) - Moderately critical - Access bypass - SA-CONTRIB-2025-023

EPSS 0.41% · P61
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-31694

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Two-factor Authentication (TFA) - Moderately critical - Access bypass - SA-CONTRIB-2025-023
Source: NVD (National Vulnerability Database)
Vulnerability Description
Incorrect Authorization vulnerability in Drupal Two-factor Authentication (TFA) allows Forceful Browsing.This issue affects Two-factor Authentication (TFA): from 0.0.0 before 1.10.0.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
使用候选路径或通道进行的认证绕过
Source: NVD (National Vulnerability Database)
Vulnerability Title
Drupal Two-factor Authentication 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Drupal Two-factor Authentication是Drupal社区的一个模块。 Drupal Two-factor Authentication 1.10.0之前版本存在安全漏洞,该漏洞源于授权不正确,可能导致强制浏览。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
DrupalTwo-factor Authentication (TFA) 0.0.0 ~ 1.10.0 -

II. Public POCs for CVE-2025-31694

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-31694

登录查看更多情报信息。

Same Patch Batch · Drupal · 2025-03-31 · 30 CVEs total

CVE-2025-31680Matomo Analytics - Moderately critical - Cross site request forgery - SA-CONTRIB-2025-008
CVE-2025-3062Drupal Admin LTE theme - Critical - Unsupported - SA-CONTRIB-2025-010
CVE-2025-3059Profile Private - Critical - Unsupported - SA-CONTRIB-2025-002
CVE-2025-3061Material Admin - Critical - Unsupported - SA-CONTRIB-2025-006
CVE-2025-3060Flattern – Multipurpose Bootstrap Business Profile - Critical - Unsupported - SA-CONTRIB-2
CVE-2025-31695Link field display mode formatter - Moderately critical - Cross site scripting - SA-CONTRI
CVE-2025-31690Cache Utility - Moderately critical - Cross Site Request Forgery - SA-CONTRIB-2025-019
CVE-2025-31688Configuration Split - Moderately critical - Cross Site Request Forgery - SA-CONTRIB-2025-0
CVE-2025-31687SpamSpan filter - Moderately critical - Cross Site Scripting - SA-CONTRIB-2025-016
CVE-2025-31697Formatter Suite - Moderately critical - Cross site scripting - SA-CONTRIB-2025-026
CVE-2025-31692AI (Artificial Intelligence) - Critical - Remote Code Execution - SA-CONTRIB-2025-021
CVE-2025-31689General Data Protection Regulation - Moderately critical - Cross Site Request Forgery - SA
CVE-2025-31693AI (Artificial Intelligence) - Moderately critical - Gadget Chain - SA-CONTRIB-2025-022
CVE-2025-31696RapiDoc OAS Field Formatter - Moderately critical - Cross site scripting - SA-CONTRIB-2025
CVE-2025-31691OAuth2 Server - Moderately critical - Access bypass - SA-CONTRIB-2025-020
CVE-2025-3057Drupal core - Critical - Cross site scripting - SA-CORE-2025-001
CVE-2025-31685Open Social - Moderately critical - Access bypass - SA-CONTRIB-2025-014
CVE-2025-31681Authenticator Login - Critical - Access bypass - SA-CONTRIB-2025-009
CVE-2025-31683Google Tag - Moderately critical - Cross Site Request Forgery - SA-CONTRIB-2025-012
CVE-2025-31684OAuth2 Client - Moderately critical - Cross Site Request Forgery - SA-CONTRIB-2025-013

Showing top 20 of 30 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2025-31694

No comments yet


Leave a comment