Cyber Posture

CVE-2025-31685

Critical

Published: 31 March 2025

Published
31 March 2025
Modified
25 August 2025
KEV Added
Patch
CVSS Score 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
EPSS Score 0.0041 61.2th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.

Security Summary

CVE-2025-31685 is a missing authorization vulnerability (CWE-862) in the Drupal Open Social distribution that allows forceful browsing. It affects Open Social versions from 0.0.0 before 12.3.11 in the 12.3.x series and from 12.4.0 before 12.4.10 in the 12.4.x series. The vulnerability carries a CVSS v3.1 base score of 9.1 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H), reflecting its critical severity with no confidentiality impact but high impacts on integrity and availability.

Unauthenticated remote attackers can exploit this vulnerability over the network with low attack complexity and no user interaction. By engaging in forceful browsing, attackers bypass authorization controls, enabling them to achieve high integrity impact through unauthorized modifications and high availability impact, potentially disrupting services.

The Drupal security advisory SA-CONTRIB-2025-014 details the vulnerability and mitigation steps, recommending upgrades to Open Social 12.3.11 or later for the 12.3.x series and 12.4.10 or later for the 12.4.x series.

Details

CWE(s)
CWE-862

Affected Products

getopensocial
open social
≤ 12.3.11 · 12.4.0 — 12.4.10

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Missing authorization vulnerability in public-facing Drupal Open Social web application allows remote unauthenticated forceful browsing to bypass controls, directly enabling exploitation of public-facing applications for initial access and unauthorized modifications.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References