Drupal security
Drupal core - Moderately critical - Access bypass - SA-CORE-2022-009
Drupal 9.3 implemented a generic entity access API for entity revisions. However, this API was not completely integrated with existing permissions, resulting in some possible access bypass for users who have access to use revisions of content generally, but who do not have access to individual items of node and media content.
This vulnerability only affects sites using Drupal's revision system.
This advisory is not covered by Drupal Steward.
Solution:Install the latest version:
- If you are using Drupal 9.3, update to Drupal 9.3.12.
All releases prior to Drupal 9.3 (including Drupal 7) are not affected.
Reported By: Fixed By:- Kristiaan Van den Eynde
- Lee Rowlands of the Drupal Security Team
- Adam Bramley
- xjm of the Drupal Security Team
- Dave Long
- Nathaniel Catchpole of the Drupal Security Team
- Jibran Ijaz
- Benji Fisher
Drupal core - Moderately critical - Improper input validation - SA-CORE-2022-008
Drupal core's form API has a vulnerability where certain contributed or custom modules' forms may be vulnerable to improper input validation. This could allow an attacker to inject disallowed values or overwrite data. Affected forms are uncommon, but in certain cases an attacker could alter critical or sensitive data.
We do not know of affected forms within core itself, but contributed and custom project forms could be affected. Installing this update will fix those forms.
This advisory is not covered by Drupal Steward.
Solution:Install the latest version:
- If you are using Drupal 9.3, update to Drupal 9.3.12.
- If you are using Drupal 9.2, update to Drupal 9.2.18.
All versions of Drupal 9 prior to 9.2.x are end-of-life and do not receive security coverage. Note that Drupal 8 has reached its end of life.
Drupal 7 is not affected.
Reported By: Fixed By:- xjm of the Drupal Security Team
- Alex Bronstein of the Drupal Security Team
- Dezső BICZÓ
- Lee Rowlands of the Drupal Security Team
Drupal core - Moderately critical - Third-party libraries - SA-CORE-2022-006
Drupal uses the third-party Guzzle library for handling HTTP requests and responses to external services. Guzzle has released a security update which may affect some Drupal sites.
We are issuing this security advisory outside our regular Drupal security release window schedule since Guzzle has already published information about the vulnerability, and vulnerabilities might exist with core, contributed modules, or custom modules that use Guzzle for outgoing requests. Guzzle has rated this vulnerability as low-risk.
This advisory is not covered by Drupal Steward.
Solution:Install the latest version:
- If you are using Drupal 9.3, update to Drupal 9.3.9.
- If you are using Drupal 9.2, update to Drupal 9.2.16.
All versions of Drupal 9 prior to 9.2.x are end-of-life and do not receive security coverage. Note that Drupal 8 has reached its end of life.
Drupal 7 is not affected.
Reported By:- Jeroen Tubex
- Damien McKenna of the Drupal Security Team
- xjm of the Drupal Security Team
- Alex Pott of the Drupal Security Team
- Lee Rowlands of the Drupal Security Team
- Greg Knaddison of the Drupal Security Team
- Peter Wolanin of the Drupal Security Team
Drupal core - Moderately critical - Third-party libraries - SA-CORE-2022-005
The Drupal project uses the CKEditor library for WYSIWYG editing. CKEditor has released a security update that impacts Drupal.
Vulnerabilities are possible if Drupal is configured to allow use of the CKEditor library for WYSIWYG editing. An attacker that can create or edit content (even without access to CKEditor themselves) may be able to exploit one or more Cross-Site Scripting (XSS) vulnerabilities to target users with access to the WYSIWYG CKEditor, including site admins with privileged access.
For more information, see CKEditor's security advisories:
- CVE-2022-24728: HTML processing vulnerability allowing to execute JavaScript code
- CVE-2022-24729: Regular expression Denial of Service in dialog plugin
This advisory is not covered by Drupal Steward.
Solution:Install the latest version:
- If you are using Drupal 9.3, update to Drupal 9.3.8.
- If you are using Drupal 9.2, update to Drupal 9.2.15.
All versions of Drupal 9 prior to 9.2.x are end-of-life and do not receive security coverage. Note that Drupal 8 has reached its end of life.
Instructions for Drupal 7 and contributed modulesDrupal 7 core is not affected, although Drupal 7, 8, and 9 site owners should review their site following the protocol for managing external libraries and plugins previously suggested by the Drupal Security Team, as contributed projects may use additional CKEditor plugins not packaged in Drupal core.
Users of the Webform module should ensure Webform's version of CKEditor 4 is also up-to-date after updating Drupal core and libraries for any affected contributed modules. Learn more about updating Webform libraries.
Reported By: Fixed By:- Jess of the Drupal Security Team
- Wim Leers
- Lee Rowlands of the Drupal Security Team
Drupal core - Moderately critical - Information disclosure - SA-CORE-2022-004
The Quick Edit module does not properly check entity access in some circumstances. This could result in users with the "access in-place editing" permission viewing some content they are are not authorized to access.
Sites are only affected if the QuickEdit module (which comes with the Standard profile) is installed.
Also see Quick Edit - Moderately critical - Information disclosure - SA-CONTRIB-2022-025 which addresses the same vulnerability for the contributed module.
This advisory is not covered by Drupal Steward.
Solution:Install the latest version:
- If you are using Drupal 9.3, update to Drupal 9.3.6.
- If you are using Drupal 9.2, update to Drupal 9.2.13.
All versions of Drupal 9 prior to 9.2.x are end-of-life and do not receive security coverage. Note that Drupal 8 has reached its end of life.
Drupal 7 core does not include the QuickEdit module and therefore is not affected.
Uninstalling the QuickEdit module will also mitigate the vulnerability. Site owners may wish to consider this option as the QuickEdit module will be removed from core in Drupal 10.
Reported By: Fixed By:- Théodore Biadala
- xjm of the Drupal Security Team
- Alex Bronstein of the Drupal Security Team
- Adam G-H
- Drew Webber of the Drupal Security Team
- Wim Leers
- Ted Bowman
- Dave Long
- Derek Wright
- Lee Rowlands of the Drupal Security Team
- Samuel Mortenson
- Joseph Zhao
Drupal core - Moderately critical - Improper input validation - SA-CORE-2022-003
Drupal core's form API has a vulnerability where certain contributed or custom modules' forms may be vulnerable to improper input validation. This could allow an attacker to inject disallowed values or overwrite data. Affected forms are uncommon, but in certain cases an attacker could alter critical or sensitive data.
This advisory is not covered by Drupal Steward.
Solution:Install the latest version:
- If you are using Drupal 9.3, update to Drupal 9.3.6.
- If you are using Drupal 9.2, update to Drupal 9.2.13.
- If you are using Drupal 7, update to Drupal 7.88.
All versions of Drupal 9 prior to 9.2.x are end-of-life and do not receive security coverage. Note that Drupal 8 has reached its end of life.
Reported By: Fixed By:- xjm of the Drupal Security Team
- Lee Rowlands of the Drupal Security Team
- Ben Dougherty of the Drupal Security Team
- Drew Webber of the Drupal Security Team
- Jen Lampton
- Nate Lampton
- Fabian Franz
- Alex Bronstein of the Drupal Security Team