Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-6ck5-9e5b-w3ay
Vulnerability ID VCID-6ck5-9e5b-w3ay
Aliases CVE-2022-25275
GHSA-xh3v-6f9j-wxw3
GMS-2022-3362
Summary Improper access control In some situations, the Image module does not correctly check access to image files not stored in the standard public files directory when generating derivative images using the image styles system. Access to a non-public file is checked only if it is stored in the "private" file system. However, some contributed modules provide additional file systems, or schemes, which may lead to this vulnerability. This vulnerability is mitigated by the fact that it only applies when the site sets (Drupal 9) $config['image.settings']['allow_insecure_derivatives'] or (Drupal 7) $conf['image_allow_insecure_derivatives'] to TRUE. The recommended and default setting is FALSE, and Drupal core does not provide a way to change that in the admin UI. Some sites may require configuration changes following this security release. Review the release notes for your Drupal version if you have issues accessing files or image styles after updating.
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
epss 0.00375 https://api.first.org/data/v1/epss?cve=CVE-2022-25275
epss 0.00375 https://api.first.org/data/v1/epss?cve=CVE-2022-25275
epss 0.00375 https://api.first.org/data/v1/epss?cve=CVE-2022-25275
epss 0.00375 https://api.first.org/data/v1/epss?cve=CVE-2022-25275
epss 0.00375 https://api.first.org/data/v1/epss?cve=CVE-2022-25275
epss 0.00375 https://api.first.org/data/v1/epss?cve=CVE-2022-25275
epss 0.00375 https://api.first.org/data/v1/epss?cve=CVE-2022-25275
cvssv3.1_qr HIGH https://github.com/advisories/GHSA-xh3v-6f9j-wxw3
cvssv3.1 7.5 https://github.com/drupal/core
generic_textual HIGH https://github.com/drupal/core
cvssv3.1 7.5 https://github.com/drupal/core/commit/2d5f47fc8a166115f56c2330a81e83abe22445cf
generic_textual HIGH https://github.com/drupal/core/commit/2d5f47fc8a166115f56c2330a81e83abe22445cf
cvssv3.1 7.5 https://github.com/drupal/core/commit/e2fbf63700819cb470a1be425798f1a3f2020116
generic_textual HIGH https://github.com/drupal/core/commit/e2fbf63700819cb470a1be425798f1a3f2020116
cvssv3.1 7.5 https://github.com/FriendsOfPHP/security-advisories/blob/master/drupal/core/CVE-2022-25275.yaml
generic_textual HIGH https://github.com/FriendsOfPHP/security-advisories/blob/master/drupal/core/CVE-2022-25275.yaml
cvssv3.1 7.5 https://nvd.nist.gov/vuln/detail/CVE-2022-25275
generic_textual HIGH https://nvd.nist.gov/vuln/detail/CVE-2022-25275
cvssv3.1 7.5 https://www.drupal.org/sa-core-2022-012
generic_textual HIGH https://www.drupal.org/sa-core-2022-012
ssvc Track https://www.drupal.org/sa-core-2022-012
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://github.com/drupal/core
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://github.com/drupal/core/commit/2d5f47fc8a166115f56c2330a81e83abe22445cf
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://github.com/drupal/core/commit/e2fbf63700819cb470a1be425798f1a3f2020116
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://github.com/FriendsOfPHP/security-advisories/blob/master/drupal/core/CVE-2022-25275.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2022-25275
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://www.drupal.org/sa-core-2022-012
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-03T18:45:46Z/ Found at https://www.drupal.org/sa-core-2022-012
Exploit Prediction Scoring System (EPSS)
Percentile 0.59084
EPSS Score 0.00375
Published At April 2, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T12:51:12.997622+00:00 GitLab Importer Import https://gitlab.com/gitlab-org/advisories-community/-/blob/main/packagist/drupal/drupal/CVE-2022-25275.yml 38.0.0