{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-48012","assignerOrgId":"2c85b837-eb8b-40ed-9d74-228c62987387","state":"PUBLISHED","assignerShortName":"drupal","dateReserved":"2025-05-14T17:45:12.225Z","datePublished":"2025-05-21T16:24:07.429Z","dateUpdated":"2025-05-21T16:49:32.969Z"},"containers":{"cna":{"affected":[{"collectionURL":"https://www.drupal.org/project/one_time_password","defaultStatus":"unaffected","product":"One Time Password","repo":"https://git.drupalcode.org/project/one_time_password","vendor":"Drupal","versions":[{"lessThan":"1.3.0","status":"affected","version":"0.0.0","versionType":"semver"}]}],"credits":[{"lang":"en","type":"finder","value":"Conrad Lara (cmlara)"},{"lang":"en","type":"remediation developer","value":"danielveza"},{"lang":"en","type":"remediation developer","value":"Lee Rowlands (larowlan)"},{"lang":"en","type":"remediation developer","value":"Ivo  Van Geertruyen (mr.baileys)"},{"lang":"en","type":"coordinator","value":"Greg Knaddison (greggles)"},{"lang":"en","type":"coordinator","value":"Juraj Nemec (poker10)"}],"datePublic":"2025-05-14T18:05:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Authentication Bypass by Capture-replay vulnerability in Drupal One Time Password allows Remote Services with Stolen Credentials.<p>This issue affects One Time Password: from 0.0.0 before 1.3.0.</p>"}],"value":"Authentication Bypass by Capture-replay vulnerability in Drupal One Time Password allows Remote Services with Stolen Credentials.This issue affects One Time Password: from 0.0.0 before 1.3.0."}],"impacts":[{"capecId":"CAPEC-555","descriptions":[{"lang":"en","value":"CAPEC-555 Remote Services with Stolen Credentials"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-294","description":"CWE-294 Authentication Bypass by Capture-replay","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"2c85b837-eb8b-40ed-9d74-228c62987387","shortName":"drupal","dateUpdated":"2025-05-21T16:24:07.429Z"},"references":[{"url":"https://www.drupal.org/sa-contrib-2025-063"}],"source":{"discovery":"UNKNOWN"},"title":"One Time Password - Moderately critical - Access bypass - SA-CONTRIB-2025-063","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":4.8,"attackVector":"NETWORK","baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N","integrityImpact":"LOW","userInteraction":"NONE","attackComplexity":"HIGH","availabilityImpact":"NONE","privilegesRequired":"NONE","confidentialityImpact":"LOW"}},{"other":{"type":"ssvc","content":{"timestamp":"2025-05-21T16:49:18.588523Z","id":"CVE-2025-48012","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-05-21T16:49:32.969Z"}}]}}