Drupal, Cross-Site Request Forgery (CSRF), CVE-2025-47701 (Medium)

Listen to this Post

How the CVE Works

The CVE-2025-47701 vulnerability in Drupal’s Restrict route by IP module (versions before 1.3.0) allows attackers to perform CSRF attacks by bypassing IP-based route restrictions. The module fails to validate CSRF tokens when processing certain HTTP requests, enabling malicious actors to forge unauthorized requests. Attackers can trick authenticated users into executing unintended actions, such as modifying restricted routes, by luring them to a malicious webpage that sends crafted requests to the vulnerable Drupal instance.

DailyCVE Form

Platform: Drupal
Version: <1.3.0
Vulnerability: CSRF bypass
Severity: Medium
Date: 06/25/2025

Prediction: Patch by 07/15/2025

What Undercode Say

Analytics:

curl -X POST http://<target>/restrict-route -d "action=modify"
import requests
csrf_exploit = requests.post("http://<target>/restrict-route", data={"route": "admin"})

How Exploit:

  • Craft malicious form/page
  • Trick admin into visiting
  • Forge POST request

Protection from this CVE:

  • Update to v1.3.0+
  • Enable CSRF tokens
  • Restrict admin access

Impact:

  • Unauthorized route changes
  • Privilege escalation
  • System compromise

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top