Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:composer/drupal/core-recommended@8.0.0
purl pkg:composer/drupal/core-recommended@8.0.0
Next non-vulnerable version 10.2.11
Latest non-vulnerable version 11.0.8
Risk 10.0
Vulnerabilities affecting this package (5)
Vulnerability Summary Fixed by
VCID-gbz5-5frj-hber
Aliases:
CVE-2020-28949
GHSA-75c5-f4gw-38r9
Multiple vulnerabilities through filename manipulation in Archive_Tar Archive_Tar through 1.4.10 has `://` filename sanitization only to address phar attacks, and thus any other stream-wrapper attack (such as `file://` to overwrite files) can still succeed. See: https://github.com/pear/Archive_Tar/issues/33
8.9.10
Affected by 8 other vulnerabilities.
9.0.0-alpha1
Affected by 7 other vulnerabilities.
9.0.9
Affected by 8 other vulnerabilities.
9.1.0-alpha1
Affected by 7 other vulnerabilities.
VCID-u4w3-usvb-jyf6
Aliases:
CVE-2024-45440
GHSA-mg8j-w93w-xjgc
Drupal Full Path Disclosure `core/authorize.php` in Drupal 11.x-dev allows Full Path Disclosure (even when error logging is None) if the value of `hash_salt` is `file_get_contents` of a file that does not exist.
10.2.9
Affected by 5 other vulnerabilities.
10.3.0-beta1
Affected by 0 other vulnerabilities.
10.3.6
Affected by 5 other vulnerabilities.
11.0.0-alpha1
Affected by 0 other vulnerabilities.
11.0.5
Affected by 4 other vulnerabilities.
VCID-ummk-h11z-bkaj
Aliases:
CVE-2022-39261
GHSA-52m2-vc4m-jj33
Twig may load a template outside a configured directory when using the filesystem loader # Description When using the filesystem loader to load templates for which the name is a user input, it is possible to use the `source` or `include` statement to read arbitrary files from outside the templates directory when using a namespace like `@somewhere/../some.file` (in such a case, validation is bypassed). # Resolution We fixed validation for such template names. Even if the 1.x branch is not maintained anymore, a new version has been released. # Credits We would like to thank Dariusz Tytko for reporting the issue and Fabien Potencier for fixing the issue.
9.3.22
Affected by 6 other vulnerabilities.
9.4.0-alpha1
Affected by 6 other vulnerabilities.
9.4.7
Affected by 6 other vulnerabilities.
9.5.0-beta1
Affected by 6 other vulnerabilities.
VCID-v9v6-ae3e-g3hk
Aliases:
CVE-2020-28948
GHSA-jh5x-hfhg-78jq
Deserialization of Untrusted Data in Archive_Tar Archive_Tar through 1.4.10 allows an unserialization attack because `phar:` is blocked but `PHAR:` is not blocked. See: https://github.com/pear/Archive_Tar/issues/33
8.9.10
Affected by 8 other vulnerabilities.
9.0.0-alpha1
Affected by 7 other vulnerabilities.
9.0.9
Affected by 8 other vulnerabilities.
9.1.0-alpha1
Affected by 7 other vulnerabilities.
VCID-vevm-4sfk-f7gq
Aliases:
CVE-2024-55634
GHSA-7cwc-fjqm-8vh8
Drupal core Access bypass Drupal's uniqueness checking for certain user fields is inconsistent depending on the database engine and its collation. As a result, a user may be able to register with the same email address as another user. This may lead to data integrity issues. This issue affects Drupal Core: from 8.0.0 before 10.2.11, from 10.3.0 before 10.3.9, from 11.0.0 before 11.0.8.
10.2.11
Affected by 0 other vulnerabilities.
10.3.9
Affected by 0 other vulnerabilities.
11.0.8
Affected by 0 other vulnerabilities.
Vulnerabilities fixed by this package (7)
Vulnerability Summary Aliases
VCID-5618-53yg-8qh4 Potential XSS vulnerability in jQuery ### Impact Passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. `.html()`, `.append()`, and others) may execute untrusted code. ### Patches This problem is patched in jQuery 3.5.0. ### Workarounds To workaround the issue without upgrading, adding the following to your code: ```js jQuery.htmlPrefilter = function( html ) { return html; }; ``` You need to use at least jQuery 1.12/2.2 or newer to be able to apply this workaround. ### References https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/ https://jquery.com/upgrade-guide/3.5/ ### For more information If you have any questions or comments about this advisory, search for a relevant issue in [the jQuery repo](https://github.com/jquery/jquery/issues). If you don't find an answer, open a new issue. CVE-2020-11022
GHSA-gxr4-xjj5-5px2
VCID-6m8x-cfzp-tkf4 Drupal core Unrestricted Upload of File with Dangerous Type Drupal core does not properly sanitize certain filenames on uploaded files, which can lead to files being interpreted as the incorrect extension and served as the wrong MIME type or executed as PHP for certain hosting configurations. This issue affects: Drupal Drupal Core 9.0 versions prior to 9.0.8, 8.9 versions prior to 8.9.9, 8.8 versions prior to 8.8.11, and 7 versions prior to 7.74. CVE-2020-13671
GHSA-68jc-v27h-vhmw
VCID-cvxp-ctj9-guej Potential XSS vulnerability in jQuery ### Impact Passing HTML containing `<option>` elements from untrusted sources - even after sanitizing them - to one of jQuery's DOM manipulation methods (i.e. `.html()`, `.append()`, and others) may execute untrusted code. ### Patches This problem is patched in jQuery 3.5.0. ### Workarounds To workaround this issue without upgrading, use [DOMPurify](https://github.com/cure53/DOMPurify) with its `SAFE_FOR_JQUERY` option to sanitize the HTML string before passing it to a jQuery method. ### References https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/ ### For more information If you have any questions or comments about this advisory, search for a relevant issue in [the jQuery repo](https://github.com/jquery/jquery/issues). If you don't find an answer, open a new issue. CVE-2020-11023
GHSA-jpcq-cgw6-v4j6
VCID-kc7d-5k6x-77bp Directory Traversal in Archive_Tar Tar.php in Archive_Tar through 1.4.11 allows write operations with Directory Traversal due to inadequate checking of symbolic links, a related issue to CVE-2020-28948. ### :exclamation: Note: There was an [initial fix](https://github.com/pear/Archive_Tar/commit/cde460582ff389404b5b3ccb59374e9b389de916) for this vulnerability made in version `1.4.12`. That fix introduced a bug which was [fixed in 1.4.13](https://github.com/pear/Archive_Tar/pull/36). Therefore we have set the first-patched-version to `1.4.13` which the earliest working version that avoids this vulnerability. CVE-2020-36193
GHSA-rpw6-9xfx-jvcx
VCID-mhk6-9qdy-83f3 Drupal Core Cross-site scripting vulnerability Cross-site scripting vulnerability in Drupal Core. Drupal AJAX API does not disable JSONP by default, allowing for an XSS attack. This issue affects: Drupal Drupal Core 7.x versions prior to 7.73; 8.8.x versions prior to 8.8.10; 8.9.x versions prior to 8.9.6; 9.0.x versions prior to 9.0.6. CVE-2020-13666
GHSA-8jj2-x2gc-ggm7
VCID-vura-3gnb-rybs Drupal Core Open Redirect vulnerability Open Redirect vulnerability in Drupal Core allows a user to be tricked into visiting a specially crafted link which would redirect them to an arbitrary external URL. This issue affects: Drupal Drupal Core 7 version 7.70 and prior versions. CVE-2020-13662
GHSA-gjqg-9rhv-qj67
VCID-zw3u-6ue7-efdf Improper Input Validation Drupal core's form API has a vulnerability where certain contributed or custom modules' forms may be vulnerable to improper input validation. This could allow an attacker to inject disallowed values or overwrite data. Affected forms are uncommon, but in certain cases an attacker could alter critical or sensitive data. CVE-2022-25271
GHSA-fmfv-x8mp-5767

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-12T00:35:20.170499+00:00 GitLab Importer Affected by VCID-vevm-4sfk-f7gq https://gitlab.com/gitlab-org/advisories-community/-/blob/main/packagist/drupal/core-recommended/CVE-2024-55634.yml 38.3.0
2026-04-12T00:24:53.614724+00:00 GitLab Importer Affected by VCID-u4w3-usvb-jyf6 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/packagist/drupal/core-recommended/CVE-2024-45440.yml 38.3.0
2026-04-11T23:28:03.599632+00:00 GitLab Importer Affected by VCID-ummk-h11z-bkaj https://gitlab.com/gitlab-org/advisories-community/-/blob/main/packagist/drupal/core-recommended/CVE-2022-39261.yml 38.3.0
2026-04-11T22:26:22.284677+00:00 GitLab Importer Affected by VCID-gbz5-5frj-hber https://gitlab.com/gitlab-org/advisories-community/-/blob/main/packagist/drupal/core-recommended/CVE-2020-28949.yml 38.3.0
2026-04-11T22:26:18.741980+00:00 GitLab Importer Affected by VCID-v9v6-ae3e-g3hk https://gitlab.com/gitlab-org/advisories-community/-/blob/main/packagist/drupal/core-recommended/CVE-2020-28948.yml 38.3.0
2026-04-07T04:56:36.508465+00:00 GHSA Importer Affected by VCID-vevm-4sfk-f7gq https://github.com/advisories/GHSA-7cwc-fjqm-8vh8 38.1.0
2026-04-03T00:43:07.287611+00:00 GitLab Importer Affected by VCID-vevm-4sfk-f7gq https://gitlab.com/gitlab-org/advisories-community/-/blob/main/packagist/drupal/core-recommended/CVE-2024-55634.yml 38.1.0
2026-04-03T00:32:29.213615+00:00 GitLab Importer Affected by VCID-u4w3-usvb-jyf6 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/packagist/drupal/core-recommended/CVE-2024-45440.yml 38.1.0
2026-04-02T23:33:52.808665+00:00 GitLab Importer Affected by VCID-ummk-h11z-bkaj https://gitlab.com/gitlab-org/advisories-community/-/blob/main/packagist/drupal/core-recommended/CVE-2022-39261.yml 38.1.0
2026-04-02T22:38:06.756006+00:00 GitLab Importer Affected by VCID-gbz5-5frj-hber https://gitlab.com/gitlab-org/advisories-community/-/blob/main/packagist/drupal/core-recommended/CVE-2020-28949.yml 38.1.0
2026-04-02T22:38:03.609316+00:00 GitLab Importer Affected by VCID-v9v6-ae3e-g3hk https://gitlab.com/gitlab-org/advisories-community/-/blob/main/packagist/drupal/core-recommended/CVE-2020-28948.yml 38.1.0
2026-04-02T12:40:31.926151+00:00 GitLab Importer Affected by VCID-vevm-4sfk-f7gq https://gitlab.com/gitlab-org/advisories-community/-/blob/main/packagist/drupal/core-recommended/CVE-2024-55634.yml 38.0.0
2026-04-02T12:39:58.230828+00:00 GitLab Importer Affected by VCID-u4w3-usvb-jyf6 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/packagist/drupal/core-recommended/CVE-2024-45440.yml 38.0.0
2026-04-02T12:38:20.961549+00:00 GitLab Importer Fixing VCID-mhk6-9qdy-83f3 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/packagist/drupal/core-recommended/CVE-2020-13666.yml 38.0.0
2026-04-02T12:38:20.677698+00:00 GitLab Importer Fixing VCID-vura-3gnb-rybs https://gitlab.com/gitlab-org/advisories-community/-/blob/main/packagist/drupal/core-recommended/CVE-2020-13662.yml 38.0.0
2026-04-02T12:37:52.310728+00:00 GitLab Importer Fixing VCID-kc7d-5k6x-77bp https://gitlab.com/gitlab-org/advisories-community/-/blob/main/packagist/drupal/core-recommended/CVE-2020-36193.yml 38.0.0
2026-04-02T12:37:40.704692+00:00 GitLab Importer Fixing VCID-6m8x-cfzp-tkf4 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/packagist/drupal/core-recommended/CVE-2020-13671.yml 38.0.0
2026-04-02T12:36:41.033192+00:00 GitLab Importer Fixing VCID-5618-53yg-8qh4 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/packagist/drupal/core-recommended/CVE-2020-11022.yml 38.0.0
2026-04-02T12:36:39.267912+00:00 GitLab Importer Fixing VCID-cvxp-ctj9-guej https://gitlab.com/gitlab-org/advisories-community/-/blob/main/packagist/drupal/core-recommended/CVE-2020-11023.yml 38.0.0
2026-04-01T17:55:48.724522+00:00 GitLab Importer Affected by VCID-ummk-h11z-bkaj https://gitlab.com/gitlab-org/advisories-community/-/blob/main/packagist/drupal/core-recommended/CVE-2022-39261.yml 38.0.0
2026-04-01T16:55:31.871133+00:00 GitLab Importer Affected by VCID-gbz5-5frj-hber https://gitlab.com/gitlab-org/advisories-community/-/blob/main/packagist/drupal/core-recommended/CVE-2020-28949.yml 38.0.0
2026-04-01T16:55:28.366685+00:00 GitLab Importer Affected by VCID-v9v6-ae3e-g3hk https://gitlab.com/gitlab-org/advisories-community/-/blob/main/packagist/drupal/core-recommended/CVE-2020-28948.yml 38.0.0
2026-04-01T16:06:19.186073+00:00 GHSA Importer Affected by VCID-u4w3-usvb-jyf6 https://github.com/advisories/GHSA-mg8j-w93w-xjgc 38.0.0
2026-04-01T12:49:35.058691+00:00 GitLab Importer Fixing VCID-zw3u-6ue7-efdf https://gitlab.com/gitlab-org/advisories-community/-/blob/main/packagist/drupal/core-recommended/CVE-2022-25271.yml 38.0.0