Search for packages
purl | pkg:composer/drupal/drupal@8.8.1 |
Vulnerability | Summary | Fixed by |
---|---|---|
VCID-1gc3-83uy-aaae
Aliases: CVE-2020-13667 GHSA-x2q9-r8gm-f657 |
Incorrect Default Permissions Access bypass vulnerability in of Drupal Core Workspaces allows an attacker to access data without correct permissions. The Workspaces module does not sufficiently check access permissions when switching workspaces, leading to an access bypass vulnerability. An attacker might be able to see content before the site owner intends people to see the content. |
Affected by 23 other vulnerabilities. Affected by 24 other vulnerabilities. Affected by 24 other vulnerabilities. |
VCID-26et-mv1c-aaag
Aliases: CVE-2022-25275 GHSA-xh3v-6f9j-wxw3 GMS-2022-3362 |
Drupal core Information Disclosure vulnerability |
Affected by 8 other vulnerabilities. Affected by 9 other vulnerabilities. |
VCID-2bng-kza3-aaaj
Aliases: GHSA-j66p-fvp2-fxhj |
Drupal core Arbitrary PHP code execution |
Affected by 19 other vulnerabilities. Affected by 20 other vulnerabilities. Affected by 20 other vulnerabilities. |
VCID-35c9-bezd-w7ft
Aliases: CVE-2024-55636 GHSA-938f-5r4f-h65v |
Drupal core contains a potential PHP Object Injection vulnerability that (if combined with another exploit) could lead to Artbitrary File Deletion. It is not directly exploitable. This issue is mitigated by the fact that in order to be exploitable, a separate vulnerability must be present that allows an attacker to pass unsafe input to `unserialize()`. There are no such known exploits in Drupal core. To help protect against this vulnerability, types have been added to properties in some of Drupal core's classes. If an application extends those classes, the same types may need to be specified on the subclass to avoid a `TypeError`. This issue affects Drupal Core: from 8.0.0 before 10.2.11, from 10.3.0 before 10.3.9, from 11.0.0 before 11.0.8. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-3nb4-kd7q-aaak
Aliases: CVE-2022-25277 GHSA-6955-67hm-vjjq GMS-2022-3361 |
Drupal core arbitrary PHP code execution |
Affected by 8 other vulnerabilities. Affected by 9 other vulnerabilities. |
VCID-3yhr-5thb-aaan
Aliases: GHSA-337w-fxpq-5m34 |
Drupal core uses a vulnerable Third-party library CKEditor |
Affected by 33 other vulnerabilities. |
VCID-5ak6-efhh-aaad
Aliases: CVE-2020-13664 GHSA-x72f-ggjw-v5xh |
Command Injection Arbitrary PHP code execution vulnerability in Drupal Core under certain circumstances. An attacker could trick an administrator into visiting a malicious site that could result in creating a carefully named directory on the file system. With this directory in place, an attacker could attempt to brute force a remote code execution vulnerability. |
Affected by 28 other vulnerabilities. Affected by 29 other vulnerabilities. Affected by 29 other vulnerabilities. |
VCID-5n9r-4ra2-aaar
Aliases: CVE-2020-9281 GHSA-vcjf-mgcg-jxjq |
Cross-site Scripting A cross-site scripting (XSS) vulnerability in the HTML Data Processor for CKEditor allows remote attackers to inject arbitrary web script through a crafted `protected` comment (with the `cke_protected` syntax). |
Affected by 33 other vulnerabilities. Affected by 16 other vulnerabilities. |
VCID-6xgv-e6y2-aaaj
Aliases: CVE-2020-13668 GHSA-m6q5-wv4x-fv6h |
Cross-site Scripting in Drupal Core |
Affected by 23 other vulnerabilities. Affected by 24 other vulnerabilities. Affected by 24 other vulnerabilities. |
VCID-7s25-1pn3-aaaa
Aliases: CVE-2021-33829 GHSA-rgx6-rjj4-c388 |
A cross-site scripting (XSS) vulnerability in the HTML Data Processor in CKEditor 4 4.14.0 through 4.16.x before 4.16.1 allows remote attackers to inject executable JavaScript code through a crafted comment because --!> is mishandled. |
Affected by 16 other vulnerabilities. Affected by 17 other vulnerabilities. Affected by 17 other vulnerabilities. |
VCID-bcv4-ry3v-aaab
Aliases: CVE-2022-39261 GHSA-52m2-vc4m-jj33 |
Twig may load a template outside a configured directory when using the filesystem loader |
Affected by 7 other vulnerabilities. Affected by 7 other vulnerabilities. Affected by 8 other vulnerabilities. Affected by 7 other vulnerabilities. |
VCID-cgr1-77ur-aaar
Aliases: CVE-2022-25273 GHSA-g36h-4jr6-qmm9 |
Improper input validation in Drupal core |
Affected by 13 other vulnerabilities. Affected by 13 other vulnerabilities. |
VCID-cnay-ga6u-aaar
Aliases: CVE-2020-13671 GHSA-68jc-v27h-vhmw |
Drupal core does not properly sanitize certain filenames on uploaded files, which can lead to files being interpreted as the incorrect extension and served as the wrong MIME type or executed as PHP for certain hosting configurations. This issue affects: Drupal Drupal Core 9.0 versions prior to 9.0.8, 8.9 versions prior to 8.9.9, 8.8 versions prior to 8.8.11, and 7 versions prior to 7.74. |
Affected by 22 other vulnerabilities. Affected by 19 other vulnerabilities. Affected by 23 other vulnerabilities. Affected by 16 other vulnerabilities. Affected by 23 other vulnerabilities. |
VCID-esfj-nun2-aaar
Aliases: CVE-2022-24728 GHSA-4fc4-4p5g-6w89 |
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') CKEditor4 is an open source what-you-see-is-what-you-get HTML editor used by drupal. A vulnerability has been discovered in the core HTML processing module and may affect all plugins used by CKEditor 4 prior to version 4.18.0. The vulnerability allows someone to inject malformed HTML bypassing content sanitization, which could result in executing JavaScript code. This problem has been patched in version 4.18.0. There are currently no known workarounds. |
Affected by 15 other vulnerabilities. Affected by 12 other vulnerabilities. Affected by 16 other vulnerabilities. Affected by 7 other vulnerabilities. |
VCID-fhgh-jkwa-aaah
Aliases: CVE-2020-11023 GHSA-jpcq-cgw6-v4j6 |
In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0. |
Affected by 31 other vulnerabilities. Affected by 19 other vulnerabilities. |
VCID-ga8h-xve8-aaae
Aliases: CVE-2022-25276 GHSA-4wfq-jc9h-vpcx |
Lack of domain validation in Druple core |
Affected by 8 other vulnerabilities. Affected by 9 other vulnerabilities. |
VCID-kkd1-e4k1-aaam
Aliases: CVE-2020-11022 GHSA-gxr4-xjj5-5px2 |
In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0. |
Affected by 31 other vulnerabilities. Affected by 19 other vulnerabilities. |
VCID-nzut-ru5h-7ydr
Aliases: CVE-2024-55634 GHSA-7cwc-fjqm-8vh8 |
Drupal core Access bypass Drupal's uniqueness checking for certain user fields is inconsistent depending on the database engine and its collation. As a result, a user may be able to register with the same email address as another user. This may lead to data integrity issues. This issue affects Drupal Core: from 8.0.0 before 10.2.11, from 10.3.0 before 10.3.9, from 11.0.0 before 11.0.8. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-p5dt-y7m6-aaaj
Aliases: CVE-2020-13666 GHSA-8jj2-x2gc-ggm7 |
Cross-site scripting vulnerability in Drupal Core. Drupal AJAX API does not disable JSONP by default, allowing for an XSS attack. This issue affects: Drupal Drupal Core 7.x versions prior to 7.73; 8.8.x versions prior to 8.8.10; 8.9.x versions prior to 8.9.6; 9.0.x versions prior to 9.0.6. |
Affected by 23 other vulnerabilities. Affected by 19 other vulnerabilities. Affected by 24 other vulnerabilities. Affected by 16 other vulnerabilities. Affected by 24 other vulnerabilities. |
VCID-pk5w-rtgg-aaap
Aliases: CVE-2020-28948 GHSA-jh5x-hfhg-78jq |
Archive_Tar through 1.4.10 allows an unserialization attack because phar: is blocked but PHAR: is not blocked. |
Affected by 19 other vulnerabilities. Affected by 19 other vulnerabilities. Affected by 20 other vulnerabilities. Affected by 16 other vulnerabilities. Affected by 20 other vulnerabilities. Affected by 17 other vulnerabilities. |
VCID-prpe-f8kr-aaam
Aliases: CVE-2020-13672 GHSA-3m36-mjwj-352c |
Cross-site Scripting (XSS) vulnerability in Drupal core's sanitization API fails to properly filter cross-site scripting under certain circumstances. This issue affects: Drupal Core 9.1.x versions prior to 9.1.7; 9.0.x versions prior to 9.0.12; 8.9.x versions prior to 8.9.14; 7.x versions prior to 7.80. |
Affected by 18 other vulnerabilities. Affected by 18 other vulnerabilities. Affected by 18 other vulnerabilities. |
VCID-q428-p8hs-aaaa
Aliases: CVE-2022-25278 GHSA-cfh2-7f6h-3m85 |
Access bypass in Drupal Core |
Affected by 8 other vulnerabilities. Affected by 9 other vulnerabilities. |
VCID-r8jq-7x4r-aaaq
Aliases: GHSA-wxfg-253g-m7r4 |
Drupal core Open Redirect vulnerability | There are no reported fixed by versions. |
VCID-rp9d-qhfh-nkdg
Aliases: CVE-2024-55637 GHSA-w6rx-9g2x-mg5g |
Drupal core contains a potential PHP Object Injection vulnerability that (if combined with another exploit) could lead to Remote Code Execution. It is not directly exploitable. This issue is mitigated by the fact that in order for it to be exploitable, a separate vulnerability must be present to allow an attacker to pass unsafe input to `unserialize()`. There are no such known exploits in Drupal core. To help protect against this potential vulnerability, types have been added to properties in some of Drupal core's classes. If an application extends those classes, the same types may need to be specified on the subclass to avoid a `TypeError`. This issue affects Drupal Core: from 8.0.0 before 10.2.11, from 10.3.0 before 10.3.9, from 11.0.0 before 11.0.8. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-rpk4-gxm8-aaab
Aliases: CVE-2022-24775 GHSA-q7rv-6hp3-vh96 |
Improper Input Validation in guzzlehttp/psr7 |
Affected by 14 other vulnerabilities. Affected by 12 other vulnerabilities. Affected by 15 other vulnerabilities. Affected by 7 other vulnerabilities. |
VCID-rvk8-qcrh-aaar
Aliases: CVE-2020-13669 GHSA-c533-c843-67h8 |
Cross-site Scripting (XSS) vulnerability in ckeditor of Drupal Core allows attacker to inject XSS. This issue affects: Drupal Core 8.8.x versions prior to 8.8.10.; 8.9.x versions prior to 8.9.6; 9.0.x versions prior to 9.0.6. |
Affected by 23 other vulnerabilities. Affected by 24 other vulnerabilities. Affected by 24 other vulnerabilities. |
VCID-s8py-wjxc-aaag
Aliases: CVE-2020-13670 GHSA-mmjr-5q74-p3m4 |
Exposure of Resource to Wrong Sphere in Drupal Core |
Affected by 23 other vulnerabilities. Affected by 24 other vulnerabilities. Affected by 24 other vulnerabilities. |
VCID-sdrj-zubv-aaak
Aliases: CVE-2020-13663 GHSA-m648-hpf8-qcjw |
Cross Site Request Forgery vulnerability in Drupal Core Form API does not properly handle certain form input from cross-site requests, which can lead to other vulnerabilities. |
Affected by 28 other vulnerabilities. Affected by 29 other vulnerabilities. Affected by 29 other vulnerabilities. |
VCID-svtf-jzyy-cbg8
Aliases: CVE-2024-55638 GHSA-gvf2-2f4g-jqf4 |
Drupal core contains a potential PHP Object Injection vulnerability that (if combined with another exploit) could lead to Remote Code Execution. It is not directly exploitable. This issue is mitigated by the fact that in order for it to be exploitable, a separate vulnerability must be present to allow an attacker to pass unsafe input to `unserialize()`. There are no such known exploits in Drupal core. To help protect against this potential vulnerability, some additional checks have been added to Drupal core's database code. If you use a third-party database driver, check the release notes for additional configuration steps that may be required in certain cases. This issue affects Drupal Core: from 7.0 before 7.102, from 8.0.0 before 10.2.11, from 10.3.0 before 10.3.9. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-tmd3-rb2s-aaan
Aliases: CVE-2020-13665 GHSA-wxqp-jwc9-g39x |
Incorrect Authorization Access bypass vulnerability in Drupal Core allows JSON:API when JSON:API is in read/write mode. |
Affected by 28 other vulnerabilities. Affected by 29 other vulnerabilities. Affected by 29 other vulnerabilities. |
VCID-u5jw-wwpt-aaab
Aliases: GHSA-qf65-hph9-453r |
Drupal Cross-Site Scripting (XSS) affecting CKEditor Third-party library |
Affected by 16 other vulnerabilities. Affected by 16 other vulnerabilities. Affected by 21 other vulnerabilities. |
VCID-xmkr-w4ma-aaan
Aliases: CVE-2020-28949 GHSA-75c5-f4gw-38r9 |
Archive_Tar through 1.4.10 has :// filename sanitization only to address phar attacks, and thus any other stream-wrapper attack (such as file:// to overwrite files) can still succeed. |
Affected by 19 other vulnerabilities. Affected by 19 other vulnerabilities. Affected by 20 other vulnerabilities. Affected by 16 other vulnerabilities. Affected by 20 other vulnerabilities. Affected by 17 other vulnerabilities. |
VCID-y3g8-ayqw-5fer
Aliases: CVE-2024-45440 GHSA-mg8j-w93w-xjgc |
core/authorize.php in Drupal 11.x-dev allows Full Path Disclosure (even when error logging is None) if the value of hash_salt is file_get_contents of a file that does not exist. |
Affected by 5 other vulnerabilities. Affected by 1 other vulnerability. Affected by 5 other vulnerabilities. Affected by 2 other vulnerabilities. Affected by 4 other vulnerabilities. |
VCID-yhf1-94ds-cbgk
Aliases: CVE-2024-12393 GHSA-8mvq-8h2v-j9vf |
Drupal Core Cross-Site Scripting (XSS) Drupal uses JavaScript to render status messages in some cases and configurations. In certain situations, the status messages are not adequately sanitized. This issue affects Drupal Core: from 8.8.0 before 10.2.11, from 10.3.0 before 10.3.9, from 11.0.0 before 11.0.8. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
VCID-z2pc-nq4m-aaas
Aliases: CVE-2022-24729 GHSA-f6rf-9m92-x2hh |
Improper Input Validation CKEditor4 is an open source what-you-see-is-what-you-get HTML editor. CKEditor4 prior to version 4.18.0 contains a vulnerability in the `dialog` plugin. The vulnerability allows abuse of a dialog input validator regular expression, which can cause a significant performance drop resulting in a browser tab freeze. A patch is available in version 4.18.0. There are currently no known workarounds. |
Affected by 15 other vulnerabilities. Affected by 12 other vulnerabilities. Affected by 16 other vulnerabilities. Affected by 7 other vulnerabilities. |
Vulnerability | Summary | Aliases |
---|---|---|
VCID-7y7x-t3r4-aaaq | Drupal core Access control bypass |
GHSA-5x28-3f32-x523
|
VCID-dhq8-q9ju-aaab | Drupal Malicious file upload with filenames stating with dot |
GHSA-58xv-7h9r-mx3c
|
VCID-gpjf-d56d-aaaj | Drupal core Denial of Service |
GHSA-w333-5f96-mjrr
|
VCID-rze1-6p9t-aaae | Drupal core Multiple vulnerabilities due to the use of the third-party library Archive_Tar |
GHSA-m9fv-whq2-6wmc
|