Overview
A major vulnerability has been discovered in Drupal Config Pages, a commonly used web-based configuration management system. This vulnerability, referred to as CVE-2025-8361, is a Missing Authorization vulnerability that allows for Forceful Browsing, potentially leading to system compromise or data leaks. As Drupal is widely used, this vulnerability could have far-reaching consequences if not appropriately mitigated.
Vulnerability Summary
CVE ID: CVE-2025-8361
Severity: High (7.6 CVSS Score)
Attack Vector: Network
Privileges Required: None
User Interaction: None
Impact: Potential system compromise or data leakage
Affected Products
Escape the Surveillance Era
Most apps won’t tell you the truth.
They’re part of the problem.
Phone numbers. Emails. Profiles. Logs.
It’s all fuel for surveillance.
Ameeba Chat gives you a way out.
- • No phone number
- • No email
- • No personal info
- • Anonymous aliases
- • End-to-end encrypted
Chat without a trace.
Product | Affected Versions
Drupal Config Pages | 0.0.0 – 2.17.9
How the Exploit Works
The CVE-2025-8361 vulnerability exploits a flaw in the authorization process of Drupal Config Pages. By performing a forceful browsing attack, an unauthorized user can bypass the normal access controls and gain access to restricted areas of the system. This can lead to data leaks or even a complete system compromise if the attacker is able to further exploit the system.
Conceptual Example Code
A conceptual example of exploiting this vulnerability could be a simple HTTP GET request to a restricted page. The attacker uses forceful browsing to attempt to access this page without the necessary permissions.
GET /admin/config_page HTTP/1.1
Host: target.example.com
The server, due to the Missing Authorization vulnerability, does not properly verify the user’s authorization and returns the requested page, thus revealing potentially sensitive information.

