Search for packages
| purl | pkg:alpm/archlinux/drupal@9.2.0-1 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-77zc-1gc8-r7b7
Aliases: CVE-2020-13675 GHSA-v8wr-r69p-mmwx |
Unrestricted Upload of File with Dangerous Type Drupal's JSON:API and REST/File modules allow file uploads through their HTTP APIs. The modules do not correctly run all file validation, which causes an access bypass vulnerability. An attacker might be able to upload files that bypass the file validation process implemented by modules on the site. |
Affected by 2 other vulnerabilities. |
|
VCID-bkxp-gn34-67av
Aliases: CVE-2020-13674 GHSA-j586-cj67-vg4p |
Cross-Site Request Forgery (CSRF) The QuickEdit module does not properly validate access to routes, which could allow cross-site request forgery under some circumstances and lead to possible data integrity issues. Sites are only affected if the QuickEdit module (which comes with the Standard profile) is installed. Removing the "access in-place editing" permission from untrusted users will not fully mitigate the vulnerability. |
Affected by 2 other vulnerabilities. |
|
VCID-fwbj-ctxz-2bc6
Aliases: CVE-2020-13676 GHSA-qfhg-m6r8-xxpj |
Incorrect Authorization The QuickEdit module does not properly check access to fields in some circumstances, which can lead to unintended disclosure of field data. Sites are only affected if the QuickEdit module (which comes with the Standard profile) is installed. |
Affected by 2 other vulnerabilities. |
|
VCID-rbbv-82ff-mbcj
Aliases: CVE-2020-13673 |
The Entity Embed module provides a filter to allow embedding entities in content fields. In certain circumstances, the filter could allow an unprivileged user to inject HTML into a page when it is accessed by a trusted user with permission to embed entities. In some cases, this could lead to cross-site scripting. |
Affected by 2 other vulnerabilities. |
|
VCID-tk1v-t2e5-jqae
Aliases: CVE-2021-32610 GHSA-p8q8-jfcv-g2h2 |
Improper Link Resolution Before File Access In Archive_Tar, symlinks can refer to targets outside of the extracted archive. | There are no reported fixed by versions. |
|
VCID-w6cz-mg4v-3udj
Aliases: CVE-2020-13677 GHSA-3xr3-phjp-g6p2 |
Drupal core access bypass vulnerability Under some circumstances, the Drupal core JSON:API module does not properly restrict access to certain content, which may result in unintended access bypass. Sites that do not have the JSON:API module enabled are not affected. |
Affected by 2 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-04-01T18:26:38.611980+00:00 | Arch Linux Importer | Affected by | VCID-tk1v-t2e5-jqae | https://security.archlinux.org/AVG-2224 | 38.0.0 |
| 2026-04-01T18:25:21.311045+00:00 | Arch Linux Importer | Affected by | VCID-rbbv-82ff-mbcj | https://security.archlinux.org/AVG-2407 | 38.0.0 |
| 2026-04-01T18:25:21.286949+00:00 | Arch Linux Importer | Affected by | VCID-bkxp-gn34-67av | https://security.archlinux.org/AVG-2407 | 38.0.0 |
| 2026-04-01T18:25:21.265087+00:00 | Arch Linux Importer | Affected by | VCID-77zc-1gc8-r7b7 | https://security.archlinux.org/AVG-2407 | 38.0.0 |
| 2026-04-01T18:25:21.241746+00:00 | Arch Linux Importer | Affected by | VCID-fwbj-ctxz-2bc6 | https://security.archlinux.org/AVG-2407 | 38.0.0 |
| 2026-04-01T18:25:21.218988+00:00 | Arch Linux Importer | Affected by | VCID-w6cz-mg4v-3udj | https://security.archlinux.org/AVG-2407 | 38.0.0 |