Search for vulnerabilities
Vulnerability details: VCID-c9az-vwyu-5yd5
Vulnerability ID VCID-c9az-vwyu-5yd5
Aliases CVE-2016-6212
GHSA-rfxx-gxwc-923c
Summary Drupal Views can allow unauthorized users to see Statistics information The Views module 7.x-3.x before 7.x-3.14 in Drupal 7.x and the Views module in Drupal 8.x before 8.1.3 might allow remote authenticated users to bypass intended access restrictions and obtain sensitive Statistics information via unspecified vectors.
Status Published
Exploitability 0.5
Weighted Severity 6.2
Risk 3.1
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
epss 0.00348 https://api.first.org/data/v1/epss?cve=CVE-2016-6212
epss 0.00348 https://api.first.org/data/v1/epss?cve=CVE-2016-6212
epss 0.00348 https://api.first.org/data/v1/epss?cve=CVE-2016-6212
epss 0.00348 https://api.first.org/data/v1/epss?cve=CVE-2016-6212
epss 0.00348 https://api.first.org/data/v1/epss?cve=CVE-2016-6212
epss 0.00348 https://api.first.org/data/v1/epss?cve=CVE-2016-6212
epss 0.00348 https://api.first.org/data/v1/epss?cve=CVE-2016-6212
epss 0.00348 https://api.first.org/data/v1/epss?cve=CVE-2016-6212
epss 0.00348 https://api.first.org/data/v1/epss?cve=CVE-2016-6212
epss 0.00348 https://api.first.org/data/v1/epss?cve=CVE-2016-6212
epss 0.00348 https://api.first.org/data/v1/epss?cve=CVE-2016-6212
epss 0.00348 https://api.first.org/data/v1/epss?cve=CVE-2016-6212
epss 0.00348 https://api.first.org/data/v1/epss?cve=CVE-2016-6212
epss 0.00348 https://api.first.org/data/v1/epss?cve=CVE-2016-6212
epss 0.00348 https://api.first.org/data/v1/epss?cve=CVE-2016-6212
epss 0.00348 https://api.first.org/data/v1/epss?cve=CVE-2016-6212
epss 0.00348 https://api.first.org/data/v1/epss?cve=CVE-2016-6212
epss 0.00348 https://api.first.org/data/v1/epss?cve=CVE-2016-6212
epss 0.00348 https://api.first.org/data/v1/epss?cve=CVE-2016-6212
epss 0.00348 https://api.first.org/data/v1/epss?cve=CVE-2016-6212
epss 0.00348 https://api.first.org/data/v1/epss?cve=CVE-2016-6212
epss 0.00348 https://api.first.org/data/v1/epss?cve=CVE-2016-6212
epss 0.00348 https://api.first.org/data/v1/epss?cve=CVE-2016-6212
epss 0.00348 https://api.first.org/data/v1/epss?cve=CVE-2016-6212
epss 0.00348 https://api.first.org/data/v1/epss?cve=CVE-2016-6212
epss 0.00348 https://api.first.org/data/v1/epss?cve=CVE-2016-6212
epss 0.00348 https://api.first.org/data/v1/epss?cve=CVE-2016-6212
cvssv3.1_qr MODERATE https://github.com/advisories/GHSA-rfxx-gxwc-923c
cvssv3.1 5.3 https://github.com/drupal/core
generic_textual MODERATE https://github.com/drupal/core
cvssv3.1 5.3 https://github.com/FriendsOfPHP/security-advisories/blob/master/drupal/core/CVE-2016-6212.yaml
generic_textual MODERATE https://github.com/FriendsOfPHP/security-advisories/blob/master/drupal/core/CVE-2016-6212.yaml
cvssv3.1 5.3 https://github.com/FriendsOfPHP/security-advisories/blob/master/drupal/drupal/CVE-2016-6212.yaml
generic_textual MODERATE https://github.com/FriendsOfPHP/security-advisories/blob/master/drupal/drupal/CVE-2016-6212.yaml
cvssv3.1 5.3 https://nvd.nist.gov/vuln/detail/CVE-2016-6212
generic_textual MODERATE https://nvd.nist.gov/vuln/detail/CVE-2016-6212
cvssv3.1 5.3 https://www.drupal.org/node/2749333
generic_textual MODERATE https://www.drupal.org/node/2749333
cvssv3.1 5.3 https://www.drupal.org/SA-CORE-2016-002
generic_textual MODERATE https://www.drupal.org/SA-CORE-2016-002
cvssv3.1 5.3 http://www.openwall.com/lists/oss-security/2016/07/13/4
generic_textual MODERATE http://www.openwall.com/lists/oss-security/2016/07/13/4
cvssv3.1 5.3 http://www.openwall.com/lists/oss-security/2016/07/13/7
generic_textual MODERATE http://www.openwall.com/lists/oss-security/2016/07/13/7
cvssv3.1 5.3 http://www.securityfocus.com/bid/91230
generic_textual MODERATE http://www.securityfocus.com/bid/91230
No exploits are available.
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://github.com/drupal/core
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://github.com/FriendsOfPHP/security-advisories/blob/master/drupal/core/CVE-2016-6212.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://github.com/FriendsOfPHP/security-advisories/blob/master/drupal/drupal/CVE-2016-6212.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2016-6212
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://www.drupal.org/node/2749333
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://www.drupal.org/SA-CORE-2016-002
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at http://www.openwall.com/lists/oss-security/2016/07/13/4
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at http://www.openwall.com/lists/oss-security/2016/07/13/7
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at http://www.securityfocus.com/bid/91230
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.56668
EPSS Score 0.00348
Published At Aug. 6, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-31T09:06:09.072114+00:00 GithubOSV Importer Import https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-rfxx-gxwc-923c/GHSA-rfxx-gxwc-923c.json 37.0.0