The vulnerability is an authentication bypass in the Drupal Email TFA module. The root cause lies in the checkTfa method within the EmailTfaSubscriber class. This method is triggered on kernel requests to check if two-factor authentication is required.
In vulnerable versions (< 2.0.6), when checkTfa determined that a TFA code was needed, it would send the code via email but would then allow the user's original request to proceed to its destination. This created a bypass, as the user was never forced to actually enter the code to prove their identity. An attacker with valid username and password credentials could therefore gain access to protected areas without completing the second authentication step.
The patch, released in version 2.0.6, rectifies this flaw. The updated checkTfa function now generates a TrustedRedirectResponse to the TFA input form and sets it on the request event. This action halts the original request and redirects the user, ensuring that they cannot proceed until they have successfully submitted the TFA code.