Search for vulnerabilities
Vulnerability details: VCID-39z2-cdgx-y7f1
Vulnerability ID VCID-39z2-cdgx-y7f1
Aliases CVE-2024-55636
GHSA-938f-5r4f-h65v
Summary Drupal core contains a potential PHP Object Injection vulnerability that (if combined with another exploit) could lead to Artbitrary File Deletion. It is not directly exploitable. This issue is mitigated by the fact that in order to be exploitable, a separate vulnerability must be present that allows an attacker to pass unsafe input to `unserialize()`. There are no such known exploits in Drupal core. To help protect against this vulnerability, types have been added to properties in some of Drupal core's classes. If an application extends those classes, the same types may need to be specified on the subclass to avoid a `TypeError`. This issue affects Drupal Core: from 8.0.0 before 10.2.11, from 10.3.0 before 10.3.9, from 11.0.0 before 11.0.8.
Status Published
Exploitability 0.5
Weighted Severity 8.8
Risk 4.4
Affected and Fixed Packages Package Details
Weaknesses (4)
System Score Found at
epss 0.03055 https://api.first.org/data/v1/epss?cve=CVE-2024-55636
epss 0.03055 https://api.first.org/data/v1/epss?cve=CVE-2024-55636
epss 0.03055 https://api.first.org/data/v1/epss?cve=CVE-2024-55636
epss 0.03055 https://api.first.org/data/v1/epss?cve=CVE-2024-55636
epss 0.04695 https://api.first.org/data/v1/epss?cve=CVE-2024-55636
epss 0.04695 https://api.first.org/data/v1/epss?cve=CVE-2024-55636
epss 0.04695 https://api.first.org/data/v1/epss?cve=CVE-2024-55636
epss 0.04695 https://api.first.org/data/v1/epss?cve=CVE-2024-55636
epss 0.04912 https://api.first.org/data/v1/epss?cve=CVE-2024-55636
epss 0.04912 https://api.first.org/data/v1/epss?cve=CVE-2024-55636
epss 0.04912 https://api.first.org/data/v1/epss?cve=CVE-2024-55636
epss 0.04912 https://api.first.org/data/v1/epss?cve=CVE-2024-55636
epss 0.04912 https://api.first.org/data/v1/epss?cve=CVE-2024-55636
epss 0.04912 https://api.first.org/data/v1/epss?cve=CVE-2024-55636
epss 0.05639 https://api.first.org/data/v1/epss?cve=CVE-2024-55636
epss 0.05639 https://api.first.org/data/v1/epss?cve=CVE-2024-55636
epss 0.05639 https://api.first.org/data/v1/epss?cve=CVE-2024-55636
epss 0.05639 https://api.first.org/data/v1/epss?cve=CVE-2024-55636
epss 0.05639 https://api.first.org/data/v1/epss?cve=CVE-2024-55636
epss 0.05639 https://api.first.org/data/v1/epss?cve=CVE-2024-55636
epss 0.05639 https://api.first.org/data/v1/epss?cve=CVE-2024-55636
epss 0.05639 https://api.first.org/data/v1/epss?cve=CVE-2024-55636
epss 0.05639 https://api.first.org/data/v1/epss?cve=CVE-2024-55636
cvssv3.1_qr LOW https://github.com/advisories/GHSA-938f-5r4f-h65v
cvssv3.1 9.8 https://github.com/drupal/core
generic_textual LOW https://github.com/drupal/core
cvssv3.1 9.8 https://github.com/drupal/core/commit/17f362b988e6ad6bd5cc1e7e8a7a0804e1536fbc
generic_textual LOW https://github.com/drupal/core/commit/17f362b988e6ad6bd5cc1e7e8a7a0804e1536fbc
cvssv3.1 9.8 https://nvd.nist.gov/vuln/detail/CVE-2024-55636
generic_textual LOW https://nvd.nist.gov/vuln/detail/CVE-2024-55636
cvssv3.1 9.8 https://www.drupal.org/sa-core-2024-006
generic_textual LOW https://www.drupal.org/sa-core-2024-006
ssvc Track https://www.drupal.org/sa-core-2024-006
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://github.com/drupal/core
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://github.com/drupal/core/commit/17f362b988e6ad6bd5cc1e7e8a7a0804e1536fbc
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2024-55636
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://www.drupal.org/sa-core-2024-006
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-12-10T21:21:16Z/ Found at https://www.drupal.org/sa-core-2024-006
Exploit Prediction Scoring System (EPSS)
Percentile 0.8628
EPSS Score 0.03055
Published At Aug. 1, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-31T08:31:41.611501+00:00 GithubOSV Importer Import https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/12/GHSA-938f-5r4f-h65v/GHSA-938f-5r4f-h65v.json 37.0.0