Search for vulnerabilities
Vulnerability details: VCID-b4d9-md2d-j7b8
Vulnerability ID VCID-b4d9-md2d-j7b8
Aliases CVE-2022-25274
GHSA-7jr4-hgqx-vwgq
Summary Access bypass in Drupal core Drupal 9.3 implemented a generic entity access API for entity revisions. However, this API was not completely integrated with existing permissions, resulting in some possible access bypass for users who have access to use revisions of content generally, but who do not have access to individual items of node and media content. This vulnerability only affects sites using Drupal's revision system. All releases prior to Drupal 9.3 (including Drupal 7) are not affected.
Status Published
Exploitability 0.5
Weighted Severity 6.2
Risk 3.1
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
epss 0.00172 https://api.first.org/data/v1/epss?cve=CVE-2022-25274
epss 0.00172 https://api.first.org/data/v1/epss?cve=CVE-2022-25274
epss 0.00172 https://api.first.org/data/v1/epss?cve=CVE-2022-25274
epss 0.00172 https://api.first.org/data/v1/epss?cve=CVE-2022-25274
epss 0.00172 https://api.first.org/data/v1/epss?cve=CVE-2022-25274
epss 0.00172 https://api.first.org/data/v1/epss?cve=CVE-2022-25274
epss 0.00172 https://api.first.org/data/v1/epss?cve=CVE-2022-25274
epss 0.00172 https://api.first.org/data/v1/epss?cve=CVE-2022-25274
epss 0.00172 https://api.first.org/data/v1/epss?cve=CVE-2022-25274
epss 0.00172 https://api.first.org/data/v1/epss?cve=CVE-2022-25274
epss 0.00172 https://api.first.org/data/v1/epss?cve=CVE-2022-25274
epss 0.00172 https://api.first.org/data/v1/epss?cve=CVE-2022-25274
epss 0.00172 https://api.first.org/data/v1/epss?cve=CVE-2022-25274
epss 0.00172 https://api.first.org/data/v1/epss?cve=CVE-2022-25274
epss 0.00172 https://api.first.org/data/v1/epss?cve=CVE-2022-25274
epss 0.00172 https://api.first.org/data/v1/epss?cve=CVE-2022-25274
epss 0.00172 https://api.first.org/data/v1/epss?cve=CVE-2022-25274
epss 0.00172 https://api.first.org/data/v1/epss?cve=CVE-2022-25274
epss 0.00172 https://api.first.org/data/v1/epss?cve=CVE-2022-25274
epss 0.00172 https://api.first.org/data/v1/epss?cve=CVE-2022-25274
epss 0.00172 https://api.first.org/data/v1/epss?cve=CVE-2022-25274
epss 0.00172 https://api.first.org/data/v1/epss?cve=CVE-2022-25274
epss 0.00172 https://api.first.org/data/v1/epss?cve=CVE-2022-25274
epss 0.00172 https://api.first.org/data/v1/epss?cve=CVE-2022-25274
epss 0.00172 https://api.first.org/data/v1/epss?cve=CVE-2022-25274
epss 0.00172 https://api.first.org/data/v1/epss?cve=CVE-2022-25274
epss 0.00172 https://api.first.org/data/v1/epss?cve=CVE-2022-25274
epss 0.00172 https://api.first.org/data/v1/epss?cve=CVE-2022-25274
cvssv3.1_qr MODERATE https://github.com/advisories/GHSA-7jr4-hgqx-vwgq
cvssv3.1 5.4 https://github.com/drupal/core
generic_textual MODERATE https://github.com/drupal/core
cvssv3.1 5.4 https://nvd.nist.gov/vuln/detail/CVE-2022-25274
generic_textual MODERATE https://nvd.nist.gov/vuln/detail/CVE-2022-25274
cvssv3.1 5.4 https://www.drupal.org/sa-core-2022-009
generic_textual MODERATE https://www.drupal.org/sa-core-2022-009
ssvc Track https://www.drupal.org/sa-core-2022-009
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N Found at https://github.com/drupal/core
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2022-25274
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N Found at https://www.drupal.org/sa-core-2022-009
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-03T18:47:15Z/ Found at https://www.drupal.org/sa-core-2022-009
Exploit Prediction Scoring System (EPSS)
Percentile 0.39144
EPSS Score 0.00172
Published At July 30, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-31T08:40:46.364606+00:00 GithubOSV Importer Import https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/04/GHSA-7jr4-hgqx-vwgq/GHSA-7jr4-hgqx-vwgq.json 37.0.0