Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:composer/drupal/core-recommended@7.0.0
purl pkg:composer/drupal/core-recommended@7.0.0
Tags Ghost
Next non-vulnerable version 10.2.11
Latest non-vulnerable version 11.0.8
Risk 10.0
Vulnerabilities affecting this package (10)
Vulnerability Summary Fixed by
VCID-5618-53yg-8qh4
Aliases:
CVE-2020-11022
GHSA-gxr4-xjj5-5px2
Potential XSS vulnerability in jQuery ### Impact Passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. `.html()`, `.append()`, and others) may execute untrusted code. ### Patches This problem is patched in jQuery 3.5.0. ### Workarounds To workaround the issue without upgrading, adding the following to your code: ```js jQuery.htmlPrefilter = function( html ) { return html; }; ``` You need to use at least jQuery 1.12/2.2 or newer to be able to apply this workaround. ### References https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/ https://jquery.com/upgrade-guide/3.5/ ### For more information If you have any questions or comments about this advisory, search for a relevant issue in [the jQuery repo](https://github.com/jquery/jquery/issues). If you don't find an answer, open a new issue.
8.0.0
Affected by 5 other vulnerabilities.
8.7.14
Affected by 5 other vulnerabilities.
8.8.0-beta1
Affected by 5 other vulnerabilities.
8.8.6
Affected by 14 other vulnerabilities.
8.9.0-beta1
Affected by 9 other vulnerabilities.
VCID-6m8x-cfzp-tkf4
Aliases:
CVE-2020-13671
GHSA-68jc-v27h-vhmw
Drupal core Unrestricted Upload of File with Dangerous Type Drupal core does not properly sanitize certain filenames on uploaded files, which can lead to files being interpreted as the incorrect extension and served as the wrong MIME type or executed as PHP for certain hosting configurations. This issue affects: Drupal Drupal Core 9.0 versions prior to 9.0.8, 8.9 versions prior to 8.9.9, 8.8 versions prior to 8.8.11, and 7 versions prior to 7.74.
8.0.0
Affected by 5 other vulnerabilities.
8.8.11
Affected by 9 other vulnerabilities.
8.9.9
Affected by 10 other vulnerabilities.
9.0.8
Affected by 10 other vulnerabilities.
VCID-cvxp-ctj9-guej
Aliases:
CVE-2020-11023
GHSA-jpcq-cgw6-v4j6
Potential XSS vulnerability in jQuery ### Impact Passing HTML containing `<option>` elements from untrusted sources - even after sanitizing them - to one of jQuery's DOM manipulation methods (i.e. `.html()`, `.append()`, and others) may execute untrusted code. ### Patches This problem is patched in jQuery 3.5.0. ### Workarounds To workaround this issue without upgrading, use [DOMPurify](https://github.com/cure53/DOMPurify) with its `SAFE_FOR_JQUERY` option to sanitize the HTML string before passing it to a jQuery method. ### References https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/ ### For more information If you have any questions or comments about this advisory, search for a relevant issue in [the jQuery repo](https://github.com/jquery/jquery/issues). If you don't find an answer, open a new issue.
8.0.0
Affected by 5 other vulnerabilities.
8.7.14
Affected by 5 other vulnerabilities.
8.8.0-beta1
Affected by 5 other vulnerabilities.
8.8.6
Affected by 14 other vulnerabilities.
8.9.0-beta1
Affected by 9 other vulnerabilities.
VCID-gbz5-5frj-hber
Aliases:
CVE-2020-28949
GHSA-75c5-f4gw-38r9
Multiple vulnerabilities through filename manipulation in Archive_Tar Archive_Tar through 1.4.10 has `://` filename sanitization only to address phar attacks, and thus any other stream-wrapper attack (such as `file://` to overwrite files) can still succeed. See: https://github.com/pear/Archive_Tar/issues/33
8.9.10
Affected by 8 other vulnerabilities.
9.0.0-alpha1
Affected by 7 other vulnerabilities.
9.0.9
Affected by 8 other vulnerabilities.
9.1.0-alpha1
Affected by 7 other vulnerabilities.
VCID-kc7d-5k6x-77bp
Aliases:
CVE-2020-36193
GHSA-rpw6-9xfx-jvcx
Directory Traversal in Archive_Tar Tar.php in Archive_Tar through 1.4.11 allows write operations with Directory Traversal due to inadequate checking of symbolic links, a related issue to CVE-2020-28948. ### :exclamation: Note: There was an [initial fix](https://github.com/pear/Archive_Tar/commit/cde460582ff389404b5b3ccb59374e9b389de916) for this vulnerability made in version `1.4.12`. That fix introduced a bug which was [fixed in 1.4.13](https://github.com/pear/Archive_Tar/pull/36). Therefore we have set the first-patched-version to `1.4.13` which the earliest working version that avoids this vulnerability.
8.0.0
Affected by 5 other vulnerabilities.
8.9.13
Affected by 7 other vulnerabilities.
9.0.0-alpha1
Affected by 7 other vulnerabilities.
9.0.11
Affected by 7 other vulnerabilities.
9.1.0-alpha1
Affected by 7 other vulnerabilities.
9.1.3
Affected by 7 other vulnerabilities.
VCID-mhk6-9qdy-83f3
Aliases:
CVE-2020-13666
GHSA-8jj2-x2gc-ggm7
Drupal Core Cross-site scripting vulnerability Cross-site scripting vulnerability in Drupal Core. Drupal AJAX API does not disable JSONP by default, allowing for an XSS attack. This issue affects: Drupal Drupal Core 7.x versions prior to 7.73; 8.8.x versions prior to 8.8.10; 8.9.x versions prior to 8.9.6; 9.0.x versions prior to 9.0.6.
8.0.0
Affected by 5 other vulnerabilities.
8.8.10
Affected by 10 other vulnerabilities.
8.9.6
Affected by 11 other vulnerabilities.
9.0.6
Affected by 11 other vulnerabilities.
VCID-rdgr-yuu7-xkey
Aliases:
CVE-2024-55638
GHSA-gvf2-2f4g-jqf4
Drupal core contains a potential PHP Object Injection vulnerability that (if combined with another exploit) could lead to Remote Code Execution. It is not directly exploitable. This issue is mitigated by the fact that in order for it to be exploitable, a separate vulnerability must be present to allow an attacker to pass unsafe input to `unserialize()`. There are no such known exploits in Drupal core. To help protect against this potential vulnerability, some additional checks have been added to Drupal core's database code. If you use a third-party database driver, check the release notes for additional configuration steps that may be required in certain cases. This issue affects Drupal Core: from 7.0 before 7.102, from 8.0.0 before 10.2.11, from 10.3.0 before 10.3.9.
7.102.0
Affected by 0 other vulnerabilities.
10.2.11
Affected by 0 other vulnerabilities.
10.3.9
Affected by 0 other vulnerabilities.
VCID-v9v6-ae3e-g3hk
Aliases:
CVE-2020-28948
GHSA-jh5x-hfhg-78jq
Deserialization of Untrusted Data in Archive_Tar Archive_Tar through 1.4.10 allows an unserialization attack because `phar:` is blocked but `PHAR:` is not blocked. See: https://github.com/pear/Archive_Tar/issues/33
8.9.10
Affected by 8 other vulnerabilities.
9.0.0-alpha1
Affected by 7 other vulnerabilities.
9.0.9
Affected by 8 other vulnerabilities.
9.1.0-alpha1
Affected by 7 other vulnerabilities.
VCID-vura-3gnb-rybs
Aliases:
CVE-2020-13662
GHSA-gjqg-9rhv-qj67
Drupal Core Open Redirect vulnerability Open Redirect vulnerability in Drupal Core allows a user to be tricked into visiting a specially crafted link which would redirect them to an arbitrary external URL. This issue affects: Drupal Drupal Core 7 version 7.70 and prior versions.
8.0.0
Affected by 5 other vulnerabilities.
VCID-zw3u-6ue7-efdf
Aliases:
CVE-2022-25271
GHSA-fmfv-x8mp-5767
Improper Input Validation Drupal core's form API has a vulnerability where certain contributed or custom modules' forms may be vulnerable to improper input validation. This could allow an attacker to inject disallowed values or overwrite data. Affected forms are uncommon, but in certain cases an attacker could alter critical or sensitive data.
8.0.0
Affected by 5 other vulnerabilities.
9.2.13
Affected by 8 other vulnerabilities.
9.3.6
Affected by 8 other vulnerabilities.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-07T04:56:36.832778+00:00 GHSA Importer Affected by VCID-rdgr-yuu7-xkey https://github.com/advisories/GHSA-gvf2-2f4g-jqf4 38.1.0
2026-04-02T12:40:32.421473+00:00 GitLab Importer Affected by VCID-rdgr-yuu7-xkey https://gitlab.com/gitlab-org/advisories-community/-/blob/main/packagist/drupal/core-recommended/CVE-2024-55638.yml 38.0.0
2026-04-02T12:38:20.919217+00:00 GitLab Importer Affected by VCID-mhk6-9qdy-83f3 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/packagist/drupal/core-recommended/CVE-2020-13666.yml 38.0.0
2026-04-02T12:38:20.668983+00:00 GitLab Importer Affected by VCID-vura-3gnb-rybs https://gitlab.com/gitlab-org/advisories-community/-/blob/main/packagist/drupal/core-recommended/CVE-2020-13662.yml 38.0.0
2026-04-02T12:37:52.265900+00:00 GitLab Importer Affected by VCID-kc7d-5k6x-77bp https://gitlab.com/gitlab-org/advisories-community/-/blob/main/packagist/drupal/core-recommended/CVE-2020-36193.yml 38.0.0
2026-04-02T12:37:40.660380+00:00 GitLab Importer Affected by VCID-6m8x-cfzp-tkf4 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/packagist/drupal/core-recommended/CVE-2020-13671.yml 38.0.0
2026-04-02T12:37:40.363015+00:00 GitLab Importer Affected by VCID-gbz5-5frj-hber https://gitlab.com/gitlab-org/advisories-community/-/blob/main/packagist/drupal/core-recommended/CVE-2020-28949.yml 38.0.0
2026-04-02T12:37:39.688865+00:00 GitLab Importer Affected by VCID-v9v6-ae3e-g3hk https://gitlab.com/gitlab-org/advisories-community/-/blob/main/packagist/drupal/core-recommended/CVE-2020-28948.yml 38.0.0
2026-04-02T12:36:41.004880+00:00 GitLab Importer Affected by VCID-5618-53yg-8qh4 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/packagist/drupal/core-recommended/CVE-2020-11022.yml 38.0.0
2026-04-02T12:36:39.237556+00:00 GitLab Importer Affected by VCID-cvxp-ctj9-guej https://gitlab.com/gitlab-org/advisories-community/-/blob/main/packagist/drupal/core-recommended/CVE-2020-11023.yml 38.0.0
2026-04-01T12:49:35.043842+00:00 GitLab Importer Affected by VCID-zw3u-6ue7-efdf https://gitlab.com/gitlab-org/advisories-community/-/blob/main/packagist/drupal/core-recommended/CVE-2022-25271.yml 38.0.0