| 0 |
| url |
VCID-1nf6-3q5b-gqfm |
| vulnerability_id |
VCID-1nf6-3q5b-gqfm |
| summary |
Drupal core contains a potential PHP Object Injection vulnerability that (if combined with another exploit) could lead to Artbitrary File Deletion. It is not directly exploitable.
This issue is mitigated by the fact that in order to be exploitable, a separate vulnerability must be present that allows an attacker to pass unsafe input to `unserialize()`. There are no such known exploits in Drupal core.
To help protect against this vulnerability, types have been added to properties in some of Drupal core's classes. If an application extends those classes, the same types may need to be specified on the subclass to avoid a `TypeError`.
This issue affects Drupal Core: from 8.0.0 before 10.2.11, from 10.3.0 before 10.3.9, from 11.0.0 before 11.0.8. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-55636 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.08785 |
| scoring_system |
epss |
| scoring_elements |
0.92495 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.08785 |
| scoring_system |
epss |
| scoring_elements |
0.92534 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.08785 |
| scoring_system |
epss |
| scoring_elements |
0.92531 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.08785 |
| scoring_system |
epss |
| scoring_elements |
0.92532 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.08785 |
| scoring_system |
epss |
| scoring_elements |
0.92522 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.08785 |
| scoring_system |
epss |
| scoring_elements |
0.92521 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.08785 |
| scoring_system |
epss |
| scoring_elements |
0.92514 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.08785 |
| scoring_system |
epss |
| scoring_elements |
0.9251 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.08785 |
| scoring_system |
epss |
| scoring_elements |
0.92498 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.08785 |
| scoring_system |
epss |
| scoring_elements |
0.92486 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-55636 |
|
| 1 |
| reference_url |
https://github.com/drupal/core |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
9.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
2.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N |
|
| 2 |
| value |
LOW |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/drupal/core |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://www.drupal.org/sa-core-2024-006 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
9.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
2.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N |
|
| 2 |
| value |
LOW |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-12-10T21:21:16Z/ |
|
|
| url |
https://www.drupal.org/sa-core-2024-006 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-55636, GHSA-938f-5r4f-h65v
|
| risk_score |
4.4 |
| exploitability |
0.5 |
| weighted_severity |
8.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1nf6-3q5b-gqfm |
|
| 1 |
| url |
VCID-2s8m-ujzb-skd1 |
| vulnerability_id |
VCID-2s8m-ujzb-skd1 |
| summary |
Drupal core contains a potential PHP Object Injection vulnerability that (if combined with another exploit) could lead to Remote Code Execution. It is not directly exploitable.
This issue is mitigated by the fact that in order for it to be exploitable, a separate vulnerability must be present to allow an attacker to pass unsafe input to `unserialize()`. There are no such known exploits in Drupal core.
To help protect against this potential vulnerability, types have been added to properties in some of Drupal core's classes. If an application extends those classes, the same types may need to be specified on the subclass to avoid a `TypeError`.
This issue affects Drupal Core: from 8.0.0 before 10.2.11, from 10.3.0 before 10.3.9, from 11.0.0 before 11.0.8. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-55637 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.07606 |
| scoring_system |
epss |
| scoring_elements |
0.9183 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.07606 |
| scoring_system |
epss |
| scoring_elements |
0.91871 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.07606 |
| scoring_system |
epss |
| scoring_elements |
0.91872 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.07606 |
| scoring_system |
epss |
| scoring_elements |
0.91876 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.07606 |
| scoring_system |
epss |
| scoring_elements |
0.9186 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.07606 |
| scoring_system |
epss |
| scoring_elements |
0.91856 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.07606 |
| scoring_system |
epss |
| scoring_elements |
0.91851 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.07606 |
| scoring_system |
epss |
| scoring_elements |
0.91838 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.07606 |
| scoring_system |
epss |
| scoring_elements |
0.91823 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-55637 |
|
| 1 |
| reference_url |
https://github.com/drupal/core |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
9.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
7.5 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/drupal/core |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://www.drupal.org/sa-core-2024-007 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
9.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
7.5 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-12-10T21:20:25Z/ |
|
|
| url |
https://www.drupal.org/sa-core-2024-007 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-55637, GHSA-w6rx-9g2x-mg5g
|
| risk_score |
4.4 |
| exploitability |
0.5 |
| weighted_severity |
8.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2s8m-ujzb-skd1 |
|
| 2 |
| url |
VCID-6ck5-9e5b-w3ay |
| vulnerability_id |
VCID-6ck5-9e5b-w3ay |
| summary |
Improper access control
In some situations, the Image module does not correctly check access to image files not stored in the standard public files directory when generating derivative images using the image styles system. Access to a non-public file is checked only if it is stored in the "private" file system. However, some contributed modules provide additional file systems, or schemes, which may lead to this vulnerability. This vulnerability is mitigated by the fact that it only applies when the site sets (Drupal 9) $config['image.settings']['allow_insecure_derivatives'] or (Drupal 7) $conf['image_allow_insecure_derivatives'] to TRUE. The recommended and default setting is FALSE, and Drupal core does not provide a way to change that in the admin UI. Some sites may require configuration changes following this security release. Review the release notes for your Drupal version if you have issues accessing files or image styles after updating. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-25275 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00375 |
| scoring_system |
epss |
| scoring_elements |
0.59084 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00375 |
| scoring_system |
epss |
| scoring_elements |
0.59071 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00375 |
| scoring_system |
epss |
| scoring_elements |
0.59107 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00375 |
| scoring_system |
epss |
| scoring_elements |
0.59128 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00375 |
| scoring_system |
epss |
| scoring_elements |
0.59148 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00375 |
| scoring_system |
epss |
| scoring_elements |
0.59143 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00375 |
| scoring_system |
epss |
| scoring_elements |
0.59144 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00375 |
| scoring_system |
epss |
| scoring_elements |
0.59126 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00375 |
| scoring_system |
epss |
| scoring_elements |
0.59123 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-25275 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://www.drupal.org/sa-core-2022-012 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
|
| 1 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 2 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-03T18:45:46Z/ |
|
|
| url |
https://www.drupal.org/sa-core-2022-012 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-25275, GHSA-xh3v-6f9j-wxw3, GMS-2022-3362
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6ck5-9e5b-w3ay |
|
| 3 |
| url |
VCID-6m8x-cfzp-tkf4 |
| vulnerability_id |
VCID-6m8x-cfzp-tkf4 |
| summary |
Drupal core Unrestricted Upload of File with Dangerous Type
Drupal core does not properly sanitize certain filenames on uploaded files, which can lead to files being interpreted as the incorrect extension and served as the wrong MIME type or executed as PHP for certain hosting configurations. This issue affects: Drupal Drupal Core 9.0 versions prior to 9.0.8, 8.9 versions prior to 8.9.9, 8.8 versions prior to 8.8.11, and 7 versions prior to 7.74. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-13671 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.04504 |
| scoring_system |
epss |
| scoring_elements |
0.89078 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.04504 |
| scoring_system |
epss |
| scoring_elements |
0.89142 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.04504 |
| scoring_system |
epss |
| scoring_elements |
0.89145 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.04504 |
| scoring_system |
epss |
| scoring_elements |
0.89133 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.04504 |
| scoring_system |
epss |
| scoring_elements |
0.89135 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.04504 |
| scoring_system |
epss |
| scoring_elements |
0.89138 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.04504 |
| scoring_system |
epss |
| scoring_elements |
0.89127 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.04504 |
| scoring_system |
epss |
| scoring_elements |
0.89102 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.04504 |
| scoring_system |
epss |
| scoring_elements |
0.89087 |
| published_at |
2026-04-02T12:55:00Z |
|
| 9 |
| value |
0.04504 |
| scoring_system |
epss |
| scoring_elements |
0.89122 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.04504 |
| scoring_system |
epss |
| scoring_elements |
0.89105 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-13671 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
| reference_url |
https://www.drupal.org/sa-core-2020-012 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
8.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:H |
|
| 1 |
| value |
8.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Attend |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:38:31Z/ |
|
|
| url |
https://www.drupal.org/sa-core-2020-012 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:composer/drupal/drupal@8.8.11 |
| purl |
pkg:composer/drupal/drupal@8.8.11 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1nf6-3q5b-gqfm |
|
| 1 |
| vulnerability |
VCID-2s8m-ujzb-skd1 |
|
| 2 |
| vulnerability |
VCID-6ck5-9e5b-w3ay |
|
| 3 |
| vulnerability |
VCID-bbzr-hbhv-yyee |
|
| 4 |
| vulnerability |
VCID-dgjq-y5zj-cud1 |
|
| 5 |
| vulnerability |
VCID-gbz5-5frj-hber |
|
| 6 |
| vulnerability |
VCID-k1gx-nznx-7qd6 |
|
| 7 |
| vulnerability |
VCID-mapb-hsvc-2khc |
|
| 8 |
| vulnerability |
VCID-n7un-zgqv-jfef |
|
| 9 |
| vulnerability |
VCID-q4qx-7s1y-q3hc |
|
| 10 |
| vulnerability |
VCID-r8pv-9upr-y7gd |
|
| 11 |
| vulnerability |
VCID-rdgr-yuu7-xkey |
|
| 12 |
| vulnerability |
VCID-u4w3-usvb-jyf6 |
|
| 13 |
| vulnerability |
VCID-v9v6-ae3e-g3hk |
|
| 14 |
| vulnerability |
VCID-vevm-4sfk-f7gq |
|
| 15 |
| vulnerability |
VCID-wbuz-qcp3-43aq |
|
| 16 |
| vulnerability |
VCID-wbvy-zrtk-audw |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:composer/drupal/drupal@8.8.11 |
|
| 1 |
| url |
pkg:composer/drupal/drupal@8.9.9 |
| purl |
pkg:composer/drupal/drupal@8.9.9 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1nf6-3q5b-gqfm |
|
| 1 |
| vulnerability |
VCID-2s8m-ujzb-skd1 |
|
| 2 |
| vulnerability |
VCID-6ck5-9e5b-w3ay |
|
| 3 |
| vulnerability |
VCID-bbzr-hbhv-yyee |
|
| 4 |
| vulnerability |
VCID-dgjq-y5zj-cud1 |
|
| 5 |
| vulnerability |
VCID-gbz5-5frj-hber |
|
| 6 |
| vulnerability |
VCID-k1gx-nznx-7qd6 |
|
| 7 |
| vulnerability |
VCID-kc7d-5k6x-77bp |
|
| 8 |
| vulnerability |
VCID-mapb-hsvc-2khc |
|
| 9 |
| vulnerability |
VCID-n7un-zgqv-jfef |
|
| 10 |
| vulnerability |
VCID-q4qx-7s1y-q3hc |
|
| 11 |
| vulnerability |
VCID-r8pv-9upr-y7gd |
|
| 12 |
| vulnerability |
VCID-rdgr-yuu7-xkey |
|
| 13 |
| vulnerability |
VCID-u4w3-usvb-jyf6 |
|
| 14 |
| vulnerability |
VCID-v9v6-ae3e-g3hk |
|
| 15 |
| vulnerability |
VCID-vevm-4sfk-f7gq |
|
| 16 |
| vulnerability |
VCID-wbuz-qcp3-43aq |
|
| 17 |
| vulnerability |
VCID-wbvy-zrtk-audw |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:composer/drupal/drupal@8.9.9 |
|
| 2 |
| url |
pkg:composer/drupal/drupal@9.0.8 |
| purl |
pkg:composer/drupal/drupal@9.0.8 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1nf6-3q5b-gqfm |
|
| 1 |
| vulnerability |
VCID-2s8m-ujzb-skd1 |
|
| 2 |
| vulnerability |
VCID-6ck5-9e5b-w3ay |
|
| 3 |
| vulnerability |
VCID-bbzr-hbhv-yyee |
|
| 4 |
| vulnerability |
VCID-dgjq-y5zj-cud1 |
|
| 5 |
| vulnerability |
VCID-gbz5-5frj-hber |
|
| 6 |
| vulnerability |
VCID-k1gx-nznx-7qd6 |
|
| 7 |
| vulnerability |
VCID-kc7d-5k6x-77bp |
|
| 8 |
| vulnerability |
VCID-mapb-hsvc-2khc |
|
| 9 |
| vulnerability |
VCID-n7un-zgqv-jfef |
|
| 10 |
| vulnerability |
VCID-q4qx-7s1y-q3hc |
|
| 11 |
| vulnerability |
VCID-r8pv-9upr-y7gd |
|
| 12 |
| vulnerability |
VCID-rdgr-yuu7-xkey |
|
| 13 |
| vulnerability |
VCID-u4w3-usvb-jyf6 |
|
| 14 |
| vulnerability |
VCID-v9v6-ae3e-g3hk |
|
| 15 |
| vulnerability |
VCID-vevm-4sfk-f7gq |
|
| 16 |
| vulnerability |
VCID-wbuz-qcp3-43aq |
|
| 17 |
| vulnerability |
VCID-wbvy-zrtk-audw |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:composer/drupal/drupal@9.0.8 |
|
|
| aliases |
CVE-2020-13671, GHSA-68jc-v27h-vhmw
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6m8x-cfzp-tkf4 |
|
| 4 |
| url |
VCID-bbzr-hbhv-yyee |
| vulnerability_id |
VCID-bbzr-hbhv-yyee |
| summary |
Improper Input Validation
Drupal core's form API has a vulnerability where certain contributed or custom modules' forms may be vulnerable to improper input validation. This could allow an attacker to inject disallowed values or overwrite data. Affected forms are uncommon, but in certain cases an attacker could alter critical or sensitive data. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-25273 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00282 |
| scoring_system |
epss |
| scoring_elements |
0.51613 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00282 |
| scoring_system |
epss |
| scoring_elements |
0.51523 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00282 |
| scoring_system |
epss |
| scoring_elements |
0.51577 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00282 |
| scoring_system |
epss |
| scoring_elements |
0.51574 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00282 |
| scoring_system |
epss |
| scoring_elements |
0.51624 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00282 |
| scoring_system |
epss |
| scoring_elements |
0.51603 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00282 |
| scoring_system |
epss |
| scoring_elements |
0.51586 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00282 |
| scoring_system |
epss |
| scoring_elements |
0.51628 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00282 |
| scoring_system |
epss |
| scoring_elements |
0.51635 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00282 |
| scoring_system |
epss |
| scoring_elements |
0.51536 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.00282 |
| scoring_system |
epss |
| scoring_elements |
0.51563 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-25273 |
|
| 1 |
|
| 2 |
| reference_url |
https://www.drupal.org/sa-core-2022-008 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N |
|
| 1 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 2 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-03T19:19:11Z/ |
|
|
| url |
https://www.drupal.org/sa-core-2022-008 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-25273, GHSA-g36h-4jr6-qmm9
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-bbzr-hbhv-yyee |
|
| 5 |
| url |
VCID-dgjq-y5zj-cud1 |
| vulnerability_id |
VCID-dgjq-y5zj-cud1 |
| summary |
Improper Access Control
Under certain circumstances, the Drupal core form API evaluates form element access incorrectly. This may lead to a user being able to alter data they should not have access to. No forms provided by Drupal core are known to be vulnerable. However, forms added through contributed or custom modules or themes may be affected. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-25278 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00452 |
| scoring_system |
epss |
| scoring_elements |
0.63737 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00452 |
| scoring_system |
epss |
| scoring_elements |
0.63777 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00452 |
| scoring_system |
epss |
| scoring_elements |
0.63767 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00452 |
| scoring_system |
epss |
| scoring_elements |
0.63732 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00452 |
| scoring_system |
epss |
| scoring_elements |
0.63765 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00452 |
| scoring_system |
epss |
| scoring_elements |
0.63749 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00452 |
| scoring_system |
epss |
| scoring_elements |
0.63697 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00452 |
| scoring_system |
epss |
| scoring_elements |
0.6378 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00452 |
| scoring_system |
epss |
| scoring_elements |
0.63766 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.00452 |
| scoring_system |
epss |
| scoring_elements |
0.63711 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-25278 |
|
| 1 |
|
| 2 |
| reference_url |
https://www.drupal.org/sa-core-2022-013 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N |
|
| 1 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 2 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-03T18:39:47Z/ |
|
|
| url |
https://www.drupal.org/sa-core-2022-013 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-25278, GHSA-cfh2-7f6h-3m85
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-dgjq-y5zj-cud1 |
|
| 6 |
| url |
VCID-gbz5-5frj-hber |
| vulnerability_id |
VCID-gbz5-5frj-hber |
| summary |
Multiple vulnerabilities through filename manipulation in Archive_Tar
Archive_Tar through 1.4.10 has `://` filename sanitization only to address phar attacks, and thus any other stream-wrapper attack (such as `file://` to overwrite files) can still succeed. See: https://github.com/pear/Archive_Tar/issues/33 |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-28949 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.92961 |
| scoring_system |
epss |
| scoring_elements |
0.99776 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.92961 |
| scoring_system |
epss |
| scoring_elements |
0.99779 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.92961 |
| scoring_system |
epss |
| scoring_elements |
0.99778 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.92961 |
| scoring_system |
epss |
| scoring_elements |
0.99777 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.93364 |
| scoring_system |
epss |
| scoring_elements |
0.99815 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-28949 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
| reference_url |
https://github.com/pear/Archive_Tar/issues/33 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:H |
|
| 1 |
| value |
7.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Attend |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:49:30Z/ |
|
|
| url |
https://github.com/pear/Archive_Tar/issues/33 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
| reference_url |
https://security.gentoo.org/glsa/202101-23 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:H |
|
| 1 |
| value |
7.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Attend |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:49:30Z/ |
|
|
| url |
https://security.gentoo.org/glsa/202101-23 |
|
| 24 |
|
| 25 |
| reference_url |
https://www.debian.org/security/2020/dsa-4817 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:H |
|
| 1 |
| value |
7.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Attend |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:49:30Z/ |
|
|
| url |
https://www.debian.org/security/2020/dsa-4817 |
|
| 26 |
| reference_url |
https://www.drupal.org/sa-core-2020-013 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
7.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:H |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Attend |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T13:49:30Z/ |
|
|
| url |
https://www.drupal.org/sa-core-2020-013 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:composer/drupal/drupal@8.8.12 |
| purl |
pkg:composer/drupal/drupal@8.8.12 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1nf6-3q5b-gqfm |
|
| 1 |
| vulnerability |
VCID-2s8m-ujzb-skd1 |
|
| 2 |
| vulnerability |
VCID-6ck5-9e5b-w3ay |
|
| 3 |
| vulnerability |
VCID-bbzr-hbhv-yyee |
|
| 4 |
| vulnerability |
VCID-dgjq-y5zj-cud1 |
|
| 5 |
| vulnerability |
VCID-k1gx-nznx-7qd6 |
|
| 6 |
| vulnerability |
VCID-mapb-hsvc-2khc |
|
| 7 |
| vulnerability |
VCID-n7un-zgqv-jfef |
|
| 8 |
| vulnerability |
VCID-q4qx-7s1y-q3hc |
|
| 9 |
| vulnerability |
VCID-r8pv-9upr-y7gd |
|
| 10 |
| vulnerability |
VCID-rdgr-yuu7-xkey |
|
| 11 |
| vulnerability |
VCID-u4w3-usvb-jyf6 |
|
| 12 |
| vulnerability |
VCID-vevm-4sfk-f7gq |
|
| 13 |
| vulnerability |
VCID-wbuz-qcp3-43aq |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:composer/drupal/drupal@8.8.12 |
|
| 1 |
|
| 2 |
| url |
pkg:composer/drupal/drupal@8.9.10 |
| purl |
pkg:composer/drupal/drupal@8.9.10 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1nf6-3q5b-gqfm |
|
| 1 |
| vulnerability |
VCID-2s8m-ujzb-skd1 |
|
| 2 |
| vulnerability |
VCID-6ck5-9e5b-w3ay |
|
| 3 |
| vulnerability |
VCID-bbzr-hbhv-yyee |
|
| 4 |
| vulnerability |
VCID-dgjq-y5zj-cud1 |
|
| 5 |
| vulnerability |
VCID-k1gx-nznx-7qd6 |
|
| 6 |
| vulnerability |
VCID-kc7d-5k6x-77bp |
|
| 7 |
| vulnerability |
VCID-mapb-hsvc-2khc |
|
| 8 |
| vulnerability |
VCID-n7un-zgqv-jfef |
|
| 9 |
| vulnerability |
VCID-q4qx-7s1y-q3hc |
|
| 10 |
| vulnerability |
VCID-r8pv-9upr-y7gd |
|
| 11 |
| vulnerability |
VCID-rdgr-yuu7-xkey |
|
| 12 |
| vulnerability |
VCID-u4w3-usvb-jyf6 |
|
| 13 |
| vulnerability |
VCID-vevm-4sfk-f7gq |
|
| 14 |
| vulnerability |
VCID-wbuz-qcp3-43aq |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:composer/drupal/drupal@8.9.10 |
|
| 3 |
|
| 4 |
| url |
pkg:composer/drupal/drupal@9.0.9 |
| purl |
pkg:composer/drupal/drupal@9.0.9 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1nf6-3q5b-gqfm |
|
| 1 |
| vulnerability |
VCID-2s8m-ujzb-skd1 |
|
| 2 |
| vulnerability |
VCID-6ck5-9e5b-w3ay |
|
| 3 |
| vulnerability |
VCID-bbzr-hbhv-yyee |
|
| 4 |
| vulnerability |
VCID-dgjq-y5zj-cud1 |
|
| 5 |
| vulnerability |
VCID-k1gx-nznx-7qd6 |
|
| 6 |
| vulnerability |
VCID-kc7d-5k6x-77bp |
|
| 7 |
| vulnerability |
VCID-mapb-hsvc-2khc |
|
| 8 |
| vulnerability |
VCID-n7un-zgqv-jfef |
|
| 9 |
| vulnerability |
VCID-q4qx-7s1y-q3hc |
|
| 10 |
| vulnerability |
VCID-r8pv-9upr-y7gd |
|
| 11 |
| vulnerability |
VCID-rdgr-yuu7-xkey |
|
| 12 |
| vulnerability |
VCID-u4w3-usvb-jyf6 |
|
| 13 |
| vulnerability |
VCID-vevm-4sfk-f7gq |
|
| 14 |
| vulnerability |
VCID-wbuz-qcp3-43aq |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:composer/drupal/drupal@9.0.9 |
|
| 5 |
|
|
| aliases |
CVE-2020-28949, GHSA-75c5-f4gw-38r9
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-gbz5-5frj-hber |
|
| 7 |
| url |
VCID-k1gx-nznx-7qd6 |
| vulnerability_id |
VCID-k1gx-nznx-7qd6 |
| summary |
Drupal core Cross-site Scripting (XSS) vulnerability
Cross-site Scripting (XSS) vulnerability in Drupal core's sanitization API fails to properly filter cross-site scripting under certain circumstances. This issue affects: Drupal Core 9.1.x versions prior to 9.1.7; 9.0.x versions prior to 9.0.12; 8.9.x versions prior to 8.9.14; 7.x versions prior to 7.80. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-13672 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00564 |
| scoring_system |
epss |
| scoring_elements |
0.68367 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00564 |
| scoring_system |
epss |
| scoring_elements |
0.68363 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00564 |
| scoring_system |
epss |
| scoring_elements |
0.68387 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00564 |
| scoring_system |
epss |
| scoring_elements |
0.68442 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00564 |
| scoring_system |
epss |
| scoring_elements |
0.68464 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00564 |
| scoring_system |
epss |
| scoring_elements |
0.68451 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00564 |
| scoring_system |
epss |
| scoring_elements |
0.68413 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00564 |
| scoring_system |
epss |
| scoring_elements |
0.68446 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00564 |
| scoring_system |
epss |
| scoring_elements |
0.68458 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00564 |
| scoring_system |
epss |
| scoring_elements |
0.68431 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00564 |
| scoring_system |
epss |
| scoring_elements |
0.68414 |
| published_at |
2026-04-08T12:55:00Z |
|
| 11 |
| value |
0.00564 |
| scoring_system |
epss |
| scoring_elements |
0.68347 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-13672 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-13672, GHSA-3m36-mjwj-352c
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-k1gx-nznx-7qd6 |
|
| 8 |
| url |
VCID-mapb-hsvc-2khc |
| vulnerability_id |
VCID-mapb-hsvc-2khc |
| summary |
Unrestricted Upload of File with Dangerous Type
Drupal core sanitizes filenames with dangerous extensions upon upload (reference: SA-CORE-2020-012) and strips leading and trailing dots from filenames to prevent uploading server configuration files (reference: SA-CORE-2019-010). However, the protections for these two vulnerabilities previously does not work correctly together. As a result, if the site were configured to allow the upload of files with an htaccess extension, these files' filenames would not be properly sanitized. This could allow bypassing the protections provided by Drupal core's default .htaccess files and possible remote code execution on Apache web servers. This issue is mitigated by the fact that it requires a field administrator to explicitly configure a file field to allow htaccess as an extension (a restricted permission), or a contributed module or custom code that overrides allowed file uploads. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-25277 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00294 |
| scoring_system |
epss |
| scoring_elements |
0.5268 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00294 |
| scoring_system |
epss |
| scoring_elements |
0.52763 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00294 |
| scoring_system |
epss |
| scoring_elements |
0.5278 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00294 |
| scoring_system |
epss |
| scoring_elements |
0.52773 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00294 |
| scoring_system |
epss |
| scoring_elements |
0.52734 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00294 |
| scoring_system |
epss |
| scoring_elements |
0.5275 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00294 |
| scoring_system |
epss |
| scoring_elements |
0.52766 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00294 |
| scoring_system |
epss |
| scoring_elements |
0.52716 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00294 |
| scoring_system |
epss |
| scoring_elements |
0.52722 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.00294 |
| scoring_system |
epss |
| scoring_elements |
0.52671 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00294 |
| scoring_system |
epss |
| scoring_elements |
0.52706 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-25277 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://www.drupal.org/sa-core-2022-014 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.2 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 2 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-03T18:41:13Z/ |
|
|
| url |
https://www.drupal.org/sa-core-2022-014 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-25277, GHSA-6955-67hm-vjjq, GMS-2022-3361
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-mapb-hsvc-2khc |
|
| 9 |
| url |
VCID-mhk6-9qdy-83f3 |
| vulnerability_id |
VCID-mhk6-9qdy-83f3 |
| summary |
Drupal Core Cross-site scripting vulnerability
Cross-site scripting vulnerability in Drupal Core. Drupal AJAX API does not disable JSONP by default, allowing for an XSS attack. This issue affects: Drupal Drupal Core 7.x versions prior to 7.73; 8.8.x versions prior to 8.8.10; 8.9.x versions prior to 8.9.6; 9.0.x versions prior to 9.0.6. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-13666 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00512 |
| scoring_system |
epss |
| scoring_elements |
0.66501 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00512 |
| scoring_system |
epss |
| scoring_elements |
0.66389 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00512 |
| scoring_system |
epss |
| scoring_elements |
0.66428 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00512 |
| scoring_system |
epss |
| scoring_elements |
0.66455 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00512 |
| scoring_system |
epss |
| scoring_elements |
0.66425 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00512 |
| scoring_system |
epss |
| scoring_elements |
0.66474 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00512 |
| scoring_system |
epss |
| scoring_elements |
0.66487 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00512 |
| scoring_system |
epss |
| scoring_elements |
0.66507 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00512 |
| scoring_system |
epss |
| scoring_elements |
0.66495 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00512 |
| scoring_system |
epss |
| scoring_elements |
0.66463 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00512 |
| scoring_system |
epss |
| scoring_elements |
0.66498 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00512 |
| scoring_system |
epss |
| scoring_elements |
0.66516 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-13666 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:composer/drupal/drupal@8.8.10 |
| purl |
pkg:composer/drupal/drupal@8.8.10 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1nf6-3q5b-gqfm |
|
| 1 |
| vulnerability |
VCID-2s8m-ujzb-skd1 |
|
| 2 |
| vulnerability |
VCID-6ck5-9e5b-w3ay |
|
| 3 |
| vulnerability |
VCID-6m8x-cfzp-tkf4 |
|
| 4 |
| vulnerability |
VCID-bbzr-hbhv-yyee |
|
| 5 |
| vulnerability |
VCID-dgjq-y5zj-cud1 |
|
| 6 |
| vulnerability |
VCID-gbz5-5frj-hber |
|
| 7 |
| vulnerability |
VCID-k1gx-nznx-7qd6 |
|
| 8 |
| vulnerability |
VCID-mapb-hsvc-2khc |
|
| 9 |
| vulnerability |
VCID-n7un-zgqv-jfef |
|
| 10 |
| vulnerability |
VCID-q4qx-7s1y-q3hc |
|
| 11 |
| vulnerability |
VCID-r8pv-9upr-y7gd |
|
| 12 |
| vulnerability |
VCID-rdgr-yuu7-xkey |
|
| 13 |
| vulnerability |
VCID-u4w3-usvb-jyf6 |
|
| 14 |
| vulnerability |
VCID-v9v6-ae3e-g3hk |
|
| 15 |
| vulnerability |
VCID-vevm-4sfk-f7gq |
|
| 16 |
| vulnerability |
VCID-wbuz-qcp3-43aq |
|
| 17 |
| vulnerability |
VCID-wbvy-zrtk-audw |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:composer/drupal/drupal@8.8.10 |
|
| 1 |
| url |
pkg:composer/drupal/drupal@8.9.6 |
| purl |
pkg:composer/drupal/drupal@8.9.6 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1nf6-3q5b-gqfm |
|
| 1 |
| vulnerability |
VCID-2s8m-ujzb-skd1 |
|
| 2 |
| vulnerability |
VCID-6ck5-9e5b-w3ay |
|
| 3 |
| vulnerability |
VCID-6m8x-cfzp-tkf4 |
|
| 4 |
| vulnerability |
VCID-bbzr-hbhv-yyee |
|
| 5 |
| vulnerability |
VCID-dgjq-y5zj-cud1 |
|
| 6 |
| vulnerability |
VCID-gbz5-5frj-hber |
|
| 7 |
| vulnerability |
VCID-k1gx-nznx-7qd6 |
|
| 8 |
| vulnerability |
VCID-kc7d-5k6x-77bp |
|
| 9 |
| vulnerability |
VCID-mapb-hsvc-2khc |
|
| 10 |
| vulnerability |
VCID-n7un-zgqv-jfef |
|
| 11 |
| vulnerability |
VCID-q4qx-7s1y-q3hc |
|
| 12 |
| vulnerability |
VCID-r8pv-9upr-y7gd |
|
| 13 |
| vulnerability |
VCID-rdgr-yuu7-xkey |
|
| 14 |
| vulnerability |
VCID-u4w3-usvb-jyf6 |
|
| 15 |
| vulnerability |
VCID-v9v6-ae3e-g3hk |
|
| 16 |
| vulnerability |
VCID-vevm-4sfk-f7gq |
|
| 17 |
| vulnerability |
VCID-wbuz-qcp3-43aq |
|
| 18 |
| vulnerability |
VCID-wbvy-zrtk-audw |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:composer/drupal/drupal@8.9.6 |
|
| 2 |
| url |
pkg:composer/drupal/drupal@9.0.6 |
| purl |
pkg:composer/drupal/drupal@9.0.6 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1nf6-3q5b-gqfm |
|
| 1 |
| vulnerability |
VCID-2s8m-ujzb-skd1 |
|
| 2 |
| vulnerability |
VCID-6ck5-9e5b-w3ay |
|
| 3 |
| vulnerability |
VCID-6m8x-cfzp-tkf4 |
|
| 4 |
| vulnerability |
VCID-bbzr-hbhv-yyee |
|
| 5 |
| vulnerability |
VCID-dgjq-y5zj-cud1 |
|
| 6 |
| vulnerability |
VCID-gbz5-5frj-hber |
|
| 7 |
| vulnerability |
VCID-k1gx-nznx-7qd6 |
|
| 8 |
| vulnerability |
VCID-kc7d-5k6x-77bp |
|
| 9 |
| vulnerability |
VCID-mapb-hsvc-2khc |
|
| 10 |
| vulnerability |
VCID-n7un-zgqv-jfef |
|
| 11 |
| vulnerability |
VCID-q4qx-7s1y-q3hc |
|
| 12 |
| vulnerability |
VCID-r8pv-9upr-y7gd |
|
| 13 |
| vulnerability |
VCID-rdgr-yuu7-xkey |
|
| 14 |
| vulnerability |
VCID-u4w3-usvb-jyf6 |
|
| 15 |
| vulnerability |
VCID-v9v6-ae3e-g3hk |
|
| 16 |
| vulnerability |
VCID-vevm-4sfk-f7gq |
|
| 17 |
| vulnerability |
VCID-wbuz-qcp3-43aq |
|
| 18 |
| vulnerability |
VCID-wbvy-zrtk-audw |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:composer/drupal/drupal@9.0.6 |
|
|
| aliases |
CVE-2020-13666, GHSA-8jj2-x2gc-ggm7
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-mhk6-9qdy-83f3 |
|
| 10 |
| url |
VCID-n119-gta2-kfg1 |
| vulnerability_id |
VCID-n119-gta2-kfg1 |
| summary |
Drupal core Cross-site Scripting (XSS) vulnerability in ckeditor
Cross-site Scripting (XSS) vulnerability in ckeditor of Drupal Core allows attacker to inject XSS. This issue affects: Drupal Core 8.8.x versions prior to 8.8.10.; 8.9.x versions prior to 8.9.6; 9.0.x versions prior to 9.0.6. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-13669 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00204 |
| scoring_system |
epss |
| scoring_elements |
0.42425 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00204 |
| scoring_system |
epss |
| scoring_elements |
0.42418 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00204 |
| scoring_system |
epss |
| scoring_elements |
0.42489 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00204 |
| scoring_system |
epss |
| scoring_elements |
0.42518 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00204 |
| scoring_system |
epss |
| scoring_elements |
0.42455 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00204 |
| scoring_system |
epss |
| scoring_elements |
0.42506 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00204 |
| scoring_system |
epss |
| scoring_elements |
0.42516 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00204 |
| scoring_system |
epss |
| scoring_elements |
0.42538 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00204 |
| scoring_system |
epss |
| scoring_elements |
0.42501 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00204 |
| scoring_system |
epss |
| scoring_elements |
0.42471 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00204 |
| scoring_system |
epss |
| scoring_elements |
0.4252 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00204 |
| scoring_system |
epss |
| scoring_elements |
0.42496 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-13669 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:composer/drupal/drupal@8.8.10 |
| purl |
pkg:composer/drupal/drupal@8.8.10 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1nf6-3q5b-gqfm |
|
| 1 |
| vulnerability |
VCID-2s8m-ujzb-skd1 |
|
| 2 |
| vulnerability |
VCID-6ck5-9e5b-w3ay |
|
| 3 |
| vulnerability |
VCID-6m8x-cfzp-tkf4 |
|
| 4 |
| vulnerability |
VCID-bbzr-hbhv-yyee |
|
| 5 |
| vulnerability |
VCID-dgjq-y5zj-cud1 |
|
| 6 |
| vulnerability |
VCID-gbz5-5frj-hber |
|
| 7 |
| vulnerability |
VCID-k1gx-nznx-7qd6 |
|
| 8 |
| vulnerability |
VCID-mapb-hsvc-2khc |
|
| 9 |
| vulnerability |
VCID-n7un-zgqv-jfef |
|
| 10 |
| vulnerability |
VCID-q4qx-7s1y-q3hc |
|
| 11 |
| vulnerability |
VCID-r8pv-9upr-y7gd |
|
| 12 |
| vulnerability |
VCID-rdgr-yuu7-xkey |
|
| 13 |
| vulnerability |
VCID-u4w3-usvb-jyf6 |
|
| 14 |
| vulnerability |
VCID-v9v6-ae3e-g3hk |
|
| 15 |
| vulnerability |
VCID-vevm-4sfk-f7gq |
|
| 16 |
| vulnerability |
VCID-wbuz-qcp3-43aq |
|
| 17 |
| vulnerability |
VCID-wbvy-zrtk-audw |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:composer/drupal/drupal@8.8.10 |
|
| 1 |
| url |
pkg:composer/drupal/drupal@8.9.6 |
| purl |
pkg:composer/drupal/drupal@8.9.6 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1nf6-3q5b-gqfm |
|
| 1 |
| vulnerability |
VCID-2s8m-ujzb-skd1 |
|
| 2 |
| vulnerability |
VCID-6ck5-9e5b-w3ay |
|
| 3 |
| vulnerability |
VCID-6m8x-cfzp-tkf4 |
|
| 4 |
| vulnerability |
VCID-bbzr-hbhv-yyee |
|
| 5 |
| vulnerability |
VCID-dgjq-y5zj-cud1 |
|
| 6 |
| vulnerability |
VCID-gbz5-5frj-hber |
|
| 7 |
| vulnerability |
VCID-k1gx-nznx-7qd6 |
|
| 8 |
| vulnerability |
VCID-kc7d-5k6x-77bp |
|
| 9 |
| vulnerability |
VCID-mapb-hsvc-2khc |
|
| 10 |
| vulnerability |
VCID-n7un-zgqv-jfef |
|
| 11 |
| vulnerability |
VCID-q4qx-7s1y-q3hc |
|
| 12 |
| vulnerability |
VCID-r8pv-9upr-y7gd |
|
| 13 |
| vulnerability |
VCID-rdgr-yuu7-xkey |
|
| 14 |
| vulnerability |
VCID-u4w3-usvb-jyf6 |
|
| 15 |
| vulnerability |
VCID-v9v6-ae3e-g3hk |
|
| 16 |
| vulnerability |
VCID-vevm-4sfk-f7gq |
|
| 17 |
| vulnerability |
VCID-wbuz-qcp3-43aq |
|
| 18 |
| vulnerability |
VCID-wbvy-zrtk-audw |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:composer/drupal/drupal@8.9.6 |
|
| 2 |
| url |
pkg:composer/drupal/drupal@9.0.6 |
| purl |
pkg:composer/drupal/drupal@9.0.6 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1nf6-3q5b-gqfm |
|
| 1 |
| vulnerability |
VCID-2s8m-ujzb-skd1 |
|
| 2 |
| vulnerability |
VCID-6ck5-9e5b-w3ay |
|
| 3 |
| vulnerability |
VCID-6m8x-cfzp-tkf4 |
|
| 4 |
| vulnerability |
VCID-bbzr-hbhv-yyee |
|
| 5 |
| vulnerability |
VCID-dgjq-y5zj-cud1 |
|
| 6 |
| vulnerability |
VCID-gbz5-5frj-hber |
|
| 7 |
| vulnerability |
VCID-k1gx-nznx-7qd6 |
|
| 8 |
| vulnerability |
VCID-kc7d-5k6x-77bp |
|
| 9 |
| vulnerability |
VCID-mapb-hsvc-2khc |
|
| 10 |
| vulnerability |
VCID-n7un-zgqv-jfef |
|
| 11 |
| vulnerability |
VCID-q4qx-7s1y-q3hc |
|
| 12 |
| vulnerability |
VCID-r8pv-9upr-y7gd |
|
| 13 |
| vulnerability |
VCID-rdgr-yuu7-xkey |
|
| 14 |
| vulnerability |
VCID-u4w3-usvb-jyf6 |
|
| 15 |
| vulnerability |
VCID-v9v6-ae3e-g3hk |
|
| 16 |
| vulnerability |
VCID-vevm-4sfk-f7gq |
|
| 17 |
| vulnerability |
VCID-wbuz-qcp3-43aq |
|
| 18 |
| vulnerability |
VCID-wbvy-zrtk-audw |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:composer/drupal/drupal@9.0.6 |
|
|
| aliases |
CVE-2020-13669, GHSA-c533-c843-67h8
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-n119-gta2-kfg1 |
|
| 11 |
| url |
VCID-n7un-zgqv-jfef |
| vulnerability_id |
VCID-n7un-zgqv-jfef |
| summary |
Lack of domain validation in Druple core
The Media oEmbed iframe route does not properly validate the iframe domain setting, which allows embeds to be displayed in the context of the primary domain. Under certain circumstances, this could lead to cross-site scripting, leaked cookies, or other vulnerabilities. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-25276 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01256 |
| scoring_system |
epss |
| scoring_elements |
0.79404 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.01256 |
| scoring_system |
epss |
| scoring_elements |
0.79365 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.01256 |
| scoring_system |
epss |
| scoring_elements |
0.79374 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.01256 |
| scoring_system |
epss |
| scoring_elements |
0.79397 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.01256 |
| scoring_system |
epss |
| scoring_elements |
0.79382 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.01256 |
| scoring_system |
epss |
| scoring_elements |
0.79371 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.01256 |
| scoring_system |
epss |
| scoring_elements |
0.79403 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.01256 |
| scoring_system |
epss |
| scoring_elements |
0.79401 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.01256 |
| scoring_system |
epss |
| scoring_elements |
0.7933 |
| published_at |
2026-04-02T12:55:00Z |
|
| 9 |
| value |
0.01256 |
| scoring_system |
epss |
| scoring_elements |
0.79353 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.01256 |
| scoring_system |
epss |
| scoring_elements |
0.79339 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-25276 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-25276, GHSA-4wfq-jc9h-vpcx
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-n7un-zgqv-jfef |
|
| 12 |
| url |
VCID-q4qx-7s1y-q3hc |
| vulnerability_id |
VCID-q4qx-7s1y-q3hc |
| summary |
Drupal Core Cross-Site Scripting (XSS)
Drupal uses JavaScript to render status messages in some cases and configurations. In certain situations, the status messages are not adequately sanitized. This issue affects Drupal Core: from 8.8.0 before 10.2.11, from 10.3.0 before 10.3.9, from 11.0.0 before 11.0.8. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-12393 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01889 |
| scoring_system |
epss |
| scoring_elements |
0.83165 |
| published_at |
2026-04-08T12:55:00Z |
|
| 1 |
| value |
0.01889 |
| scoring_system |
epss |
| scoring_elements |
0.83219 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.01889 |
| scoring_system |
epss |
| scoring_elements |
0.83217 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.01889 |
| scoring_system |
epss |
| scoring_elements |
0.83179 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.01889 |
| scoring_system |
epss |
| scoring_elements |
0.83183 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.01889 |
| scoring_system |
epss |
| scoring_elements |
0.83189 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.01889 |
| scoring_system |
epss |
| scoring_elements |
0.83129 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.01889 |
| scoring_system |
epss |
| scoring_elements |
0.83142 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.01889 |
| scoring_system |
epss |
| scoring_elements |
0.83141 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.01889 |
| scoring_system |
epss |
| scoring_elements |
0.83173 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.01889 |
| scoring_system |
epss |
| scoring_elements |
0.83216 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-12393 |
|
| 1 |
| reference_url |
https://github.com/drupal/core |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.4 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N |
|
| 1 |
| value |
5.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/drupal/core |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://www.drupal.org/sa-core-2024-003 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.4 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N |
|
| 1 |
| value |
5.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-11T16:36:16Z/ |
|
|
| url |
https://www.drupal.org/sa-core-2024-003 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-12393, GHSA-8mvq-8h2v-j9vf
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-q4qx-7s1y-q3hc |
|
| 13 |
| url |
VCID-r8pv-9upr-y7gd |
| vulnerability_id |
VCID-r8pv-9upr-y7gd |
| summary |
Drupal Cross-Site Scripting (XSS) affecting CKEditor Third-party library
The Drupal project uses the CKEditor, library for WYSIWYG editing. CKEditor has released a security update that impacts Drupal.
Vulnerabilities are possible if Drupal is configured to allow use of the CKEditor library for WYSIWYG editing. An attacker that can create or edit content (even without access to CKEditor themselves) may be able to exploit one or more Cross-Site Scripting (XSS) vulnerabilities to target users with access to the WYSIWYG CKEditor, including site admins with privileged access. |
| references |
|
| fixed_packages |
| 0 |
|
| 1 |
|
| 2 |
| url |
pkg:composer/drupal/drupal@9.2.4 |
| purl |
pkg:composer/drupal/drupal@9.2.4 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1nf6-3q5b-gqfm |
|
| 1 |
| vulnerability |
VCID-2s8m-ujzb-skd1 |
|
| 2 |
| vulnerability |
VCID-674z-nf4t-b7ez |
|
| 3 |
| vulnerability |
VCID-6ck5-9e5b-w3ay |
|
| 4 |
| vulnerability |
VCID-b4yh-gyrx-3yhh |
|
| 5 |
| vulnerability |
VCID-bbzr-hbhv-yyee |
|
| 6 |
| vulnerability |
VCID-dgjq-y5zj-cud1 |
|
| 7 |
| vulnerability |
VCID-gypk-ukbc-7qe3 |
|
| 8 |
| vulnerability |
VCID-mapb-hsvc-2khc |
|
| 9 |
| vulnerability |
VCID-n7un-zgqv-jfef |
|
| 10 |
| vulnerability |
VCID-q4qx-7s1y-q3hc |
|
| 11 |
| vulnerability |
VCID-rdgr-yuu7-xkey |
|
| 12 |
| vulnerability |
VCID-sbmj-9trz-2ybf |
|
| 13 |
| vulnerability |
VCID-u4w3-usvb-jyf6 |
|
| 14 |
| vulnerability |
VCID-vevm-4sfk-f7gq |
|
| 15 |
| vulnerability |
VCID-wbuz-qcp3-43aq |
|
| 16 |
| vulnerability |
VCID-zw3u-6ue7-efdf |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:composer/drupal/drupal@9.2.4 |
|
|
| aliases |
GHSA-qf65-hph9-453r
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-r8pv-9upr-y7gd |
|
| 14 |
| url |
VCID-rdgr-yuu7-xkey |
| vulnerability_id |
VCID-rdgr-yuu7-xkey |
| summary |
Drupal core contains a potential PHP Object Injection vulnerability that (if combined with another exploit) could lead to Remote Code Execution. It is not directly exploitable.
This issue is mitigated by the fact that in order for it to be exploitable, a separate vulnerability must be present to allow an attacker to pass unsafe input to `unserialize()`. There are no such known exploits in Drupal core.
To help protect against this potential vulnerability, some additional checks have been added to Drupal core's database code. If you use a third-party database driver, check the release notes for additional configuration steps that may be required in certain cases.
This issue affects Drupal Core: from 7.0 before 7.102, from 8.0.0 before 10.2.11, from 10.3.0 before 10.3.9. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-55638 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.05148 |
| scoring_system |
epss |
| scoring_elements |
0.89896 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.05148 |
| scoring_system |
epss |
| scoring_elements |
0.89842 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.05148 |
| scoring_system |
epss |
| scoring_elements |
0.89855 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.05148 |
| scoring_system |
epss |
| scoring_elements |
0.89861 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.05148 |
| scoring_system |
epss |
| scoring_elements |
0.89878 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.05148 |
| scoring_system |
epss |
| scoring_elements |
0.89884 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.05148 |
| scoring_system |
epss |
| scoring_elements |
0.8989 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.05148 |
| scoring_system |
epss |
| scoring_elements |
0.89888 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.05148 |
| scoring_system |
epss |
| scoring_elements |
0.89881 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.05148 |
| scoring_system |
epss |
| scoring_elements |
0.89895 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-55638 |
|
| 1 |
| reference_url |
https://github.com/drupal/core |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
9.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
7.5 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/drupal/core |
|
| 2 |
|
| 3 |
| reference_url |
https://www.drupal.org/sa-core-2024-008 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
9.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
7.5 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-12-10T21:19:33Z/ |
|
|
| url |
https://www.drupal.org/sa-core-2024-008 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-55638, GHSA-gvf2-2f4g-jqf4
|
| risk_score |
4.4 |
| exploitability |
0.5 |
| weighted_severity |
8.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rdgr-yuu7-xkey |
|
| 15 |
| url |
VCID-u4w3-usvb-jyf6 |
| vulnerability_id |
VCID-u4w3-usvb-jyf6 |
| summary |
Drupal Full Path Disclosure
`core/authorize.php` in Drupal 11.x-dev allows Full Path Disclosure (even when error logging is None) if the value of `hash_salt` is `file_get_contents` of a file that does not exist. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-45440 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.86443 |
| scoring_system |
epss |
| scoring_elements |
0.99404 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.86443 |
| scoring_system |
epss |
| scoring_elements |
0.99405 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.87227 |
| scoring_system |
epss |
| scoring_elements |
0.99452 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.87227 |
| scoring_system |
epss |
| scoring_elements |
0.99449 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.87227 |
| scoring_system |
epss |
| scoring_elements |
0.99448 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.87227 |
| scoring_system |
epss |
| scoring_elements |
0.99445 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.87227 |
| scoring_system |
epss |
| scoring_elements |
0.99447 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.87227 |
| scoring_system |
epss |
| scoring_elements |
0.99453 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-45440 |
|
| 1 |
| reference_url |
https://github.com/drupal/drupal |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N |
|
| 1 |
| value |
6.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/drupal/drupal |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
| reference_url |
https://www.drupal.org/project/drupal/issues/3457781 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N |
|
| 1 |
| value |
6.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-29T13:18:23Z/ |
|
|
| url |
https://www.drupal.org/project/drupal/issues/3457781 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
| reference_url |
https://www.exploit-db.com/exploits/52266 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N |
|
| 1 |
| value |
6.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://www.exploit-db.com/exploits/52266 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-45440, GHSA-mg8j-w93w-xjgc
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-u4w3-usvb-jyf6 |
|
| 16 |
| url |
VCID-uqcw-p8g2-cfd2 |
| vulnerability_id |
VCID-uqcw-p8g2-cfd2 |
| summary |
Exposure of Resource to Wrong Sphere
Information Disclosure vulnerability in file module of Drupal Core allows an attacker to gain access to the file metadata of a permanent private file that they do not have access to by guessing the ID of the file. This issue affects: Drupal Core 8.8.x versions prior to 8.8.10; 8.9.x versions prior to 8.9.6; 9.0.x versions prior to 9.0.6. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-13670 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00427 |
| scoring_system |
epss |
| scoring_elements |
0.62226 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00427 |
| scoring_system |
epss |
| scoring_elements |
0.6237 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00427 |
| scoring_system |
epss |
| scoring_elements |
0.62386 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00427 |
| scoring_system |
epss |
| scoring_elements |
0.62379 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00427 |
| scoring_system |
epss |
| scoring_elements |
0.62334 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00427 |
| scoring_system |
epss |
| scoring_elements |
0.62355 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00427 |
| scoring_system |
epss |
| scoring_elements |
0.62366 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00427 |
| scoring_system |
epss |
| scoring_elements |
0.62346 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00427 |
| scoring_system |
epss |
| scoring_elements |
0.62329 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.00427 |
| scoring_system |
epss |
| scoring_elements |
0.62279 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00427 |
| scoring_system |
epss |
| scoring_elements |
0.62313 |
| published_at |
2026-04-04T12:55:00Z |
|
| 11 |
| value |
0.00427 |
| scoring_system |
epss |
| scoring_elements |
0.62283 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-13670 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:composer/drupal/drupal@8.8.10 |
| purl |
pkg:composer/drupal/drupal@8.8.10 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1nf6-3q5b-gqfm |
|
| 1 |
| vulnerability |
VCID-2s8m-ujzb-skd1 |
|
| 2 |
| vulnerability |
VCID-6ck5-9e5b-w3ay |
|
| 3 |
| vulnerability |
VCID-6m8x-cfzp-tkf4 |
|
| 4 |
| vulnerability |
VCID-bbzr-hbhv-yyee |
|
| 5 |
| vulnerability |
VCID-dgjq-y5zj-cud1 |
|
| 6 |
| vulnerability |
VCID-gbz5-5frj-hber |
|
| 7 |
| vulnerability |
VCID-k1gx-nznx-7qd6 |
|
| 8 |
| vulnerability |
VCID-mapb-hsvc-2khc |
|
| 9 |
| vulnerability |
VCID-n7un-zgqv-jfef |
|
| 10 |
| vulnerability |
VCID-q4qx-7s1y-q3hc |
|
| 11 |
| vulnerability |
VCID-r8pv-9upr-y7gd |
|
| 12 |
| vulnerability |
VCID-rdgr-yuu7-xkey |
|
| 13 |
| vulnerability |
VCID-u4w3-usvb-jyf6 |
|
| 14 |
| vulnerability |
VCID-v9v6-ae3e-g3hk |
|
| 15 |
| vulnerability |
VCID-vevm-4sfk-f7gq |
|
| 16 |
| vulnerability |
VCID-wbuz-qcp3-43aq |
|
| 17 |
| vulnerability |
VCID-wbvy-zrtk-audw |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:composer/drupal/drupal@8.8.10 |
|
| 1 |
| url |
pkg:composer/drupal/drupal@8.9.6 |
| purl |
pkg:composer/drupal/drupal@8.9.6 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1nf6-3q5b-gqfm |
|
| 1 |
| vulnerability |
VCID-2s8m-ujzb-skd1 |
|
| 2 |
| vulnerability |
VCID-6ck5-9e5b-w3ay |
|
| 3 |
| vulnerability |
VCID-6m8x-cfzp-tkf4 |
|
| 4 |
| vulnerability |
VCID-bbzr-hbhv-yyee |
|
| 5 |
| vulnerability |
VCID-dgjq-y5zj-cud1 |
|
| 6 |
| vulnerability |
VCID-gbz5-5frj-hber |
|
| 7 |
| vulnerability |
VCID-k1gx-nznx-7qd6 |
|
| 8 |
| vulnerability |
VCID-kc7d-5k6x-77bp |
|
| 9 |
| vulnerability |
VCID-mapb-hsvc-2khc |
|
| 10 |
| vulnerability |
VCID-n7un-zgqv-jfef |
|
| 11 |
| vulnerability |
VCID-q4qx-7s1y-q3hc |
|
| 12 |
| vulnerability |
VCID-r8pv-9upr-y7gd |
|
| 13 |
| vulnerability |
VCID-rdgr-yuu7-xkey |
|
| 14 |
| vulnerability |
VCID-u4w3-usvb-jyf6 |
|
| 15 |
| vulnerability |
VCID-v9v6-ae3e-g3hk |
|
| 16 |
| vulnerability |
VCID-vevm-4sfk-f7gq |
|
| 17 |
| vulnerability |
VCID-wbuz-qcp3-43aq |
|
| 18 |
| vulnerability |
VCID-wbvy-zrtk-audw |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:composer/drupal/drupal@8.9.6 |
|
| 2 |
| url |
pkg:composer/drupal/drupal@9.0.6 |
| purl |
pkg:composer/drupal/drupal@9.0.6 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1nf6-3q5b-gqfm |
|
| 1 |
| vulnerability |
VCID-2s8m-ujzb-skd1 |
|
| 2 |
| vulnerability |
VCID-6ck5-9e5b-w3ay |
|
| 3 |
| vulnerability |
VCID-6m8x-cfzp-tkf4 |
|
| 4 |
| vulnerability |
VCID-bbzr-hbhv-yyee |
|
| 5 |
| vulnerability |
VCID-dgjq-y5zj-cud1 |
|
| 6 |
| vulnerability |
VCID-gbz5-5frj-hber |
|
| 7 |
| vulnerability |
VCID-k1gx-nznx-7qd6 |
|
| 8 |
| vulnerability |
VCID-kc7d-5k6x-77bp |
|
| 9 |
| vulnerability |
VCID-mapb-hsvc-2khc |
|
| 10 |
| vulnerability |
VCID-n7un-zgqv-jfef |
|
| 11 |
| vulnerability |
VCID-q4qx-7s1y-q3hc |
|
| 12 |
| vulnerability |
VCID-r8pv-9upr-y7gd |
|
| 13 |
| vulnerability |
VCID-rdgr-yuu7-xkey |
|
| 14 |
| vulnerability |
VCID-u4w3-usvb-jyf6 |
|
| 15 |
| vulnerability |
VCID-v9v6-ae3e-g3hk |
|
| 16 |
| vulnerability |
VCID-vevm-4sfk-f7gq |
|
| 17 |
| vulnerability |
VCID-wbuz-qcp3-43aq |
|
| 18 |
| vulnerability |
VCID-wbvy-zrtk-audw |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:composer/drupal/drupal@9.0.6 |
|
|
| aliases |
CVE-2020-13670, GHSA-mmjr-5q74-p3m4
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-uqcw-p8g2-cfd2 |
|
| 17 |
| url |
VCID-v9v6-ae3e-g3hk |
| vulnerability_id |
VCID-v9v6-ae3e-g3hk |
| summary |
Deserialization of Untrusted Data in Archive_Tar
Archive_Tar through 1.4.10 allows an unserialization attack because `phar:` is blocked but `PHAR:` is not blocked. See: https://github.com/pear/Archive_Tar/issues/33 |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-28948 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.76218 |
| scoring_system |
epss |
| scoring_elements |
0.98924 |
| published_at |
2026-04-08T12:55:00Z |
|
| 1 |
| value |
0.76218 |
| scoring_system |
epss |
| scoring_elements |
0.98929 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.76218 |
| scoring_system |
epss |
| scoring_elements |
0.98927 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.76218 |
| scoring_system |
epss |
| scoring_elements |
0.98926 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.76218 |
| scoring_system |
epss |
| scoring_elements |
0.98925 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.76218 |
| scoring_system |
epss |
| scoring_elements |
0.98923 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.76218 |
| scoring_system |
epss |
| scoring_elements |
0.98922 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.76218 |
| scoring_system |
epss |
| scoring_elements |
0.9892 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.76218 |
| scoring_system |
epss |
| scoring_elements |
0.98917 |
| published_at |
2026-04-02T12:55:00Z |
|
| 9 |
| value |
0.76873 |
| scoring_system |
epss |
| scoring_elements |
0.9896 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-28948 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:composer/drupal/drupal@8.8.12 |
| purl |
pkg:composer/drupal/drupal@8.8.12 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1nf6-3q5b-gqfm |
|
| 1 |
| vulnerability |
VCID-2s8m-ujzb-skd1 |
|
| 2 |
| vulnerability |
VCID-6ck5-9e5b-w3ay |
|
| 3 |
| vulnerability |
VCID-bbzr-hbhv-yyee |
|
| 4 |
| vulnerability |
VCID-dgjq-y5zj-cud1 |
|
| 5 |
| vulnerability |
VCID-k1gx-nznx-7qd6 |
|
| 6 |
| vulnerability |
VCID-mapb-hsvc-2khc |
|
| 7 |
| vulnerability |
VCID-n7un-zgqv-jfef |
|
| 8 |
| vulnerability |
VCID-q4qx-7s1y-q3hc |
|
| 9 |
| vulnerability |
VCID-r8pv-9upr-y7gd |
|
| 10 |
| vulnerability |
VCID-rdgr-yuu7-xkey |
|
| 11 |
| vulnerability |
VCID-u4w3-usvb-jyf6 |
|
| 12 |
| vulnerability |
VCID-vevm-4sfk-f7gq |
|
| 13 |
| vulnerability |
VCID-wbuz-qcp3-43aq |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:composer/drupal/drupal@8.8.12 |
|
| 1 |
|
| 2 |
| url |
pkg:composer/drupal/drupal@8.9.10 |
| purl |
pkg:composer/drupal/drupal@8.9.10 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1nf6-3q5b-gqfm |
|
| 1 |
| vulnerability |
VCID-2s8m-ujzb-skd1 |
|
| 2 |
| vulnerability |
VCID-6ck5-9e5b-w3ay |
|
| 3 |
| vulnerability |
VCID-bbzr-hbhv-yyee |
|
| 4 |
| vulnerability |
VCID-dgjq-y5zj-cud1 |
|
| 5 |
| vulnerability |
VCID-k1gx-nznx-7qd6 |
|
| 6 |
| vulnerability |
VCID-kc7d-5k6x-77bp |
|
| 7 |
| vulnerability |
VCID-mapb-hsvc-2khc |
|
| 8 |
| vulnerability |
VCID-n7un-zgqv-jfef |
|
| 9 |
| vulnerability |
VCID-q4qx-7s1y-q3hc |
|
| 10 |
| vulnerability |
VCID-r8pv-9upr-y7gd |
|
| 11 |
| vulnerability |
VCID-rdgr-yuu7-xkey |
|
| 12 |
| vulnerability |
VCID-u4w3-usvb-jyf6 |
|
| 13 |
| vulnerability |
VCID-vevm-4sfk-f7gq |
|
| 14 |
| vulnerability |
VCID-wbuz-qcp3-43aq |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:composer/drupal/drupal@8.9.10 |
|
| 3 |
|
| 4 |
| url |
pkg:composer/drupal/drupal@9.0.9 |
| purl |
pkg:composer/drupal/drupal@9.0.9 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1nf6-3q5b-gqfm |
|
| 1 |
| vulnerability |
VCID-2s8m-ujzb-skd1 |
|
| 2 |
| vulnerability |
VCID-6ck5-9e5b-w3ay |
|
| 3 |
| vulnerability |
VCID-bbzr-hbhv-yyee |
|
| 4 |
| vulnerability |
VCID-dgjq-y5zj-cud1 |
|
| 5 |
| vulnerability |
VCID-k1gx-nznx-7qd6 |
|
| 6 |
| vulnerability |
VCID-kc7d-5k6x-77bp |
|
| 7 |
| vulnerability |
VCID-mapb-hsvc-2khc |
|
| 8 |
| vulnerability |
VCID-n7un-zgqv-jfef |
|
| 9 |
| vulnerability |
VCID-q4qx-7s1y-q3hc |
|
| 10 |
| vulnerability |
VCID-r8pv-9upr-y7gd |
|
| 11 |
| vulnerability |
VCID-rdgr-yuu7-xkey |
|
| 12 |
| vulnerability |
VCID-u4w3-usvb-jyf6 |
|
| 13 |
| vulnerability |
VCID-vevm-4sfk-f7gq |
|
| 14 |
| vulnerability |
VCID-wbuz-qcp3-43aq |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:composer/drupal/drupal@9.0.9 |
|
| 5 |
|
|
| aliases |
CVE-2020-28948, GHSA-jh5x-hfhg-78jq
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-v9v6-ae3e-g3hk |
|
| 18 |
| url |
VCID-vevm-4sfk-f7gq |
| vulnerability_id |
VCID-vevm-4sfk-f7gq |
| summary |
Drupal core Access bypass
Drupal's uniqueness checking for certain user fields is inconsistent depending on the database engine and its collation. As a result, a user may be able to register with the same email address as another user. This may lead to data integrity issues. This issue affects Drupal Core: from 8.0.0 before 10.2.11, from 10.3.0 before 10.3.9, from 11.0.0 before 11.0.8. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-55634 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00848 |
| scoring_system |
epss |
| scoring_elements |
0.74881 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00848 |
| scoring_system |
epss |
| scoring_elements |
0.74805 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00848 |
| scoring_system |
epss |
| scoring_elements |
0.74833 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00848 |
| scoring_system |
epss |
| scoring_elements |
0.74806 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00848 |
| scoring_system |
epss |
| scoring_elements |
0.74839 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00848 |
| scoring_system |
epss |
| scoring_elements |
0.74853 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00848 |
| scoring_system |
epss |
| scoring_elements |
0.74877 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00848 |
| scoring_system |
epss |
| scoring_elements |
0.74856 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00848 |
| scoring_system |
epss |
| scoring_elements |
0.74846 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00848 |
| scoring_system |
epss |
| scoring_elements |
0.74883 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00848 |
| scoring_system |
epss |
| scoring_elements |
0.7489 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-55634 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://www.drupal.org/sa-core-2024-004 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
8.1 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N |
|
| 1 |
| value |
6.9 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-11T16:38:29Z/ |
|
|
| url |
https://www.drupal.org/sa-core-2024-004 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-55634, GHSA-7cwc-fjqm-8vh8
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vevm-4sfk-f7gq |
|
| 19 |
| url |
VCID-wbuz-qcp3-43aq |
| vulnerability_id |
VCID-wbuz-qcp3-43aq |
| summary |
Improper Input Validation
guzzlehttp/psr7 is a PSR-7 HTTP message library used in drupal. Versions prior to 1.8.4 and 2.1.1 is vulnerable to improper header parsing. An attacker could sneak in a new line character and pass untrusted values. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-24775 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00933 |
| scoring_system |
epss |
| scoring_elements |
0.76168 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00933 |
| scoring_system |
epss |
| scoring_elements |
0.76084 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00933 |
| scoring_system |
epss |
| scoring_elements |
0.76116 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00933 |
| scoring_system |
epss |
| scoring_elements |
0.76095 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00933 |
| scoring_system |
epss |
| scoring_elements |
0.76128 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00933 |
| scoring_system |
epss |
| scoring_elements |
0.76142 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00933 |
| scoring_system |
epss |
| scoring_elements |
0.76167 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00933 |
| scoring_system |
epss |
| scoring_elements |
0.76143 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00933 |
| scoring_system |
epss |
| scoring_elements |
0.7614 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00933 |
| scoring_system |
epss |
| scoring_elements |
0.76181 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00933 |
| scoring_system |
epss |
| scoring_elements |
0.76185 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-24775 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
| reference_url |
https://www.drupal.org/sa-core-2022-006 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N |
|
| 1 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:56:31Z/ |
|
|
| url |
https://www.drupal.org/sa-core-2022-006 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-24775, GHSA-q7rv-6hp3-vh96
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-wbuz-qcp3-43aq |
|
| 20 |
| url |
VCID-wbvy-zrtk-audw |
| vulnerability_id |
VCID-wbvy-zrtk-audw |
| summary |
Drupal core Arbitrary PHP code execution
The Drupal project uses the PEAR Archive_Tar library. The PEAR Archive_Tar library has released a security update that impacts Drupal. For more information please see:
CVE-2020-28948
CVE-2020-28949
Multiple vulnerabilities are possible if Drupal is configured to allow .tar, .tar.gz, .bz2, or .tlz file uploads and processes them.
To mitigate this issue, prevent untrusted users from uploading .tar, .tar.gz, .bz2, or .tlz files. |
| references |
|
| fixed_packages |
| 0 |
| url |
pkg:composer/drupal/drupal@8.8.12 |
| purl |
pkg:composer/drupal/drupal@8.8.12 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1nf6-3q5b-gqfm |
|
| 1 |
| vulnerability |
VCID-2s8m-ujzb-skd1 |
|
| 2 |
| vulnerability |
VCID-6ck5-9e5b-w3ay |
|
| 3 |
| vulnerability |
VCID-bbzr-hbhv-yyee |
|
| 4 |
| vulnerability |
VCID-dgjq-y5zj-cud1 |
|
| 5 |
| vulnerability |
VCID-k1gx-nznx-7qd6 |
|
| 6 |
| vulnerability |
VCID-mapb-hsvc-2khc |
|
| 7 |
| vulnerability |
VCID-n7un-zgqv-jfef |
|
| 8 |
| vulnerability |
VCID-q4qx-7s1y-q3hc |
|
| 9 |
| vulnerability |
VCID-r8pv-9upr-y7gd |
|
| 10 |
| vulnerability |
VCID-rdgr-yuu7-xkey |
|
| 11 |
| vulnerability |
VCID-u4w3-usvb-jyf6 |
|
| 12 |
| vulnerability |
VCID-vevm-4sfk-f7gq |
|
| 13 |
| vulnerability |
VCID-wbuz-qcp3-43aq |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:composer/drupal/drupal@8.8.12 |
|
| 1 |
| url |
pkg:composer/drupal/drupal@8.9.10 |
| purl |
pkg:composer/drupal/drupal@8.9.10 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1nf6-3q5b-gqfm |
|
| 1 |
| vulnerability |
VCID-2s8m-ujzb-skd1 |
|
| 2 |
| vulnerability |
VCID-6ck5-9e5b-w3ay |
|
| 3 |
| vulnerability |
VCID-bbzr-hbhv-yyee |
|
| 4 |
| vulnerability |
VCID-dgjq-y5zj-cud1 |
|
| 5 |
| vulnerability |
VCID-k1gx-nznx-7qd6 |
|
| 6 |
| vulnerability |
VCID-kc7d-5k6x-77bp |
|
| 7 |
| vulnerability |
VCID-mapb-hsvc-2khc |
|
| 8 |
| vulnerability |
VCID-n7un-zgqv-jfef |
|
| 9 |
| vulnerability |
VCID-q4qx-7s1y-q3hc |
|
| 10 |
| vulnerability |
VCID-r8pv-9upr-y7gd |
|
| 11 |
| vulnerability |
VCID-rdgr-yuu7-xkey |
|
| 12 |
| vulnerability |
VCID-u4w3-usvb-jyf6 |
|
| 13 |
| vulnerability |
VCID-vevm-4sfk-f7gq |
|
| 14 |
| vulnerability |
VCID-wbuz-qcp3-43aq |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:composer/drupal/drupal@8.9.10 |
|
| 2 |
| url |
pkg:composer/drupal/drupal@9.0.9 |
| purl |
pkg:composer/drupal/drupal@9.0.9 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1nf6-3q5b-gqfm |
|
| 1 |
| vulnerability |
VCID-2s8m-ujzb-skd1 |
|
| 2 |
| vulnerability |
VCID-6ck5-9e5b-w3ay |
|
| 3 |
| vulnerability |
VCID-bbzr-hbhv-yyee |
|
| 4 |
| vulnerability |
VCID-dgjq-y5zj-cud1 |
|
| 5 |
| vulnerability |
VCID-k1gx-nznx-7qd6 |
|
| 6 |
| vulnerability |
VCID-kc7d-5k6x-77bp |
|
| 7 |
| vulnerability |
VCID-mapb-hsvc-2khc |
|
| 8 |
| vulnerability |
VCID-n7un-zgqv-jfef |
|
| 9 |
| vulnerability |
VCID-q4qx-7s1y-q3hc |
|
| 10 |
| vulnerability |
VCID-r8pv-9upr-y7gd |
|
| 11 |
| vulnerability |
VCID-rdgr-yuu7-xkey |
|
| 12 |
| vulnerability |
VCID-u4w3-usvb-jyf6 |
|
| 13 |
| vulnerability |
VCID-vevm-4sfk-f7gq |
|
| 14 |
| vulnerability |
VCID-wbuz-qcp3-43aq |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:composer/drupal/drupal@9.0.9 |
|
|
| aliases |
GHSA-j66p-fvp2-fxhj
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-wbvy-zrtk-audw |
|
| 21 |
| url |
VCID-ww44-hb2y-mfd5 |
| vulnerability_id |
VCID-ww44-hb2y-mfd5 |
| summary |
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Access Bypass vulnerability in Drupal Core allows for an attacker to leverage the way that HTML is rendered for affected forms in order to exploit the vulnerability. This issue affects: Drupal Core 8.8.x versions prior to 8.8.10; 8.9.x versions prior to 8.9.6; 9.0.x versions prior to 9.0.6. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-13668 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00223 |
| scoring_system |
epss |
| scoring_elements |
0.44824 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00223 |
| scoring_system |
epss |
| scoring_elements |
0.44927 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00223 |
| scoring_system |
epss |
| scoring_elements |
0.44907 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00223 |
| scoring_system |
epss |
| scoring_elements |
0.44909 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00223 |
| scoring_system |
epss |
| scoring_elements |
0.44959 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00223 |
| scoring_system |
epss |
| scoring_elements |
0.44965 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00223 |
| scoring_system |
epss |
| scoring_elements |
0.44913 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00223 |
| scoring_system |
epss |
| scoring_elements |
0.44911 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00223 |
| scoring_system |
epss |
| scoring_elements |
0.44943 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00223 |
| scoring_system |
epss |
| scoring_elements |
0.44922 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00223 |
| scoring_system |
epss |
| scoring_elements |
0.4492 |
| published_at |
2026-04-08T12:55:00Z |
|
| 11 |
| value |
0.00223 |
| scoring_system |
epss |
| scoring_elements |
0.44868 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-13668 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:composer/drupal/drupal@8.8.10 |
| purl |
pkg:composer/drupal/drupal@8.8.10 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1nf6-3q5b-gqfm |
|
| 1 |
| vulnerability |
VCID-2s8m-ujzb-skd1 |
|
| 2 |
| vulnerability |
VCID-6ck5-9e5b-w3ay |
|
| 3 |
| vulnerability |
VCID-6m8x-cfzp-tkf4 |
|
| 4 |
| vulnerability |
VCID-bbzr-hbhv-yyee |
|
| 5 |
| vulnerability |
VCID-dgjq-y5zj-cud1 |
|
| 6 |
| vulnerability |
VCID-gbz5-5frj-hber |
|
| 7 |
| vulnerability |
VCID-k1gx-nznx-7qd6 |
|
| 8 |
| vulnerability |
VCID-mapb-hsvc-2khc |
|
| 9 |
| vulnerability |
VCID-n7un-zgqv-jfef |
|
| 10 |
| vulnerability |
VCID-q4qx-7s1y-q3hc |
|
| 11 |
| vulnerability |
VCID-r8pv-9upr-y7gd |
|
| 12 |
| vulnerability |
VCID-rdgr-yuu7-xkey |
|
| 13 |
| vulnerability |
VCID-u4w3-usvb-jyf6 |
|
| 14 |
| vulnerability |
VCID-v9v6-ae3e-g3hk |
|
| 15 |
| vulnerability |
VCID-vevm-4sfk-f7gq |
|
| 16 |
| vulnerability |
VCID-wbuz-qcp3-43aq |
|
| 17 |
| vulnerability |
VCID-wbvy-zrtk-audw |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:composer/drupal/drupal@8.8.10 |
|
| 1 |
| url |
pkg:composer/drupal/drupal@8.9.6 |
| purl |
pkg:composer/drupal/drupal@8.9.6 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1nf6-3q5b-gqfm |
|
| 1 |
| vulnerability |
VCID-2s8m-ujzb-skd1 |
|
| 2 |
| vulnerability |
VCID-6ck5-9e5b-w3ay |
|
| 3 |
| vulnerability |
VCID-6m8x-cfzp-tkf4 |
|
| 4 |
| vulnerability |
VCID-bbzr-hbhv-yyee |
|
| 5 |
| vulnerability |
VCID-dgjq-y5zj-cud1 |
|
| 6 |
| vulnerability |
VCID-gbz5-5frj-hber |
|
| 7 |
| vulnerability |
VCID-k1gx-nznx-7qd6 |
|
| 8 |
| vulnerability |
VCID-kc7d-5k6x-77bp |
|
| 9 |
| vulnerability |
VCID-mapb-hsvc-2khc |
|
| 10 |
| vulnerability |
VCID-n7un-zgqv-jfef |
|
| 11 |
| vulnerability |
VCID-q4qx-7s1y-q3hc |
|
| 12 |
| vulnerability |
VCID-r8pv-9upr-y7gd |
|
| 13 |
| vulnerability |
VCID-rdgr-yuu7-xkey |
|
| 14 |
| vulnerability |
VCID-u4w3-usvb-jyf6 |
|
| 15 |
| vulnerability |
VCID-v9v6-ae3e-g3hk |
|
| 16 |
| vulnerability |
VCID-vevm-4sfk-f7gq |
|
| 17 |
| vulnerability |
VCID-wbuz-qcp3-43aq |
|
| 18 |
| vulnerability |
VCID-wbvy-zrtk-audw |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:composer/drupal/drupal@8.9.6 |
|
| 2 |
| url |
pkg:composer/drupal/drupal@9.0.6 |
| purl |
pkg:composer/drupal/drupal@9.0.6 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-1nf6-3q5b-gqfm |
|
| 1 |
| vulnerability |
VCID-2s8m-ujzb-skd1 |
|
| 2 |
| vulnerability |
VCID-6ck5-9e5b-w3ay |
|
| 3 |
| vulnerability |
VCID-6m8x-cfzp-tkf4 |
|
| 4 |
| vulnerability |
VCID-bbzr-hbhv-yyee |
|
| 5 |
| vulnerability |
VCID-dgjq-y5zj-cud1 |
|
| 6 |
| vulnerability |
VCID-gbz5-5frj-hber |
|
| 7 |
| vulnerability |
VCID-k1gx-nznx-7qd6 |
|
| 8 |
| vulnerability |
VCID-kc7d-5k6x-77bp |
|
| 9 |
| vulnerability |
VCID-mapb-hsvc-2khc |
|
| 10 |
| vulnerability |
VCID-n7un-zgqv-jfef |
|
| 11 |
| vulnerability |
VCID-q4qx-7s1y-q3hc |
|
| 12 |
| vulnerability |
VCID-r8pv-9upr-y7gd |
|
| 13 |
| vulnerability |
VCID-rdgr-yuu7-xkey |
|
| 14 |
| vulnerability |
VCID-u4w3-usvb-jyf6 |
|
| 15 |
| vulnerability |
VCID-v9v6-ae3e-g3hk |
|
| 16 |
| vulnerability |
VCID-vevm-4sfk-f7gq |
|
| 17 |
| vulnerability |
VCID-wbuz-qcp3-43aq |
|
| 18 |
| vulnerability |
VCID-wbvy-zrtk-audw |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:composer/drupal/drupal@9.0.6 |
|
|
| aliases |
CVE-2020-13668, GHSA-m6q5-wv4x-fv6h
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ww44-hb2y-mfd5 |
|