Search for vulnerabilities
Vulnerability details: VCID-rp9d-qhfh-nkdg
Vulnerability ID VCID-rp9d-qhfh-nkdg
Aliases CVE-2024-55637
GHSA-w6rx-9g2x-mg5g
Summary Drupal core contains a potential PHP Object Injection vulnerability that (if combined with another exploit) could lead to Remote Code Execution. It is not directly exploitable. This issue is mitigated by the fact that in order for it to be exploitable, a separate vulnerability must be present to allow an attacker to pass unsafe input to `unserialize()`. There are no such known exploits in Drupal core. To help protect against this potential vulnerability, types have been added to properties in some of Drupal core's classes. If an application extends those classes, the same types may need to be specified on the subclass to avoid a `TypeError`. This issue affects Drupal Core: from 8.0.0 before 10.2.11, from 10.3.0 before 10.3.9, from 11.0.0 before 11.0.8.
Status Published
Exploitability 0.5
Weighted Severity 8.8
Risk 4.4
Affected and Fixed Packages Package Details
Weaknesses (4)
System Score Found at
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2024-55637
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2024-55637
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2024-55637
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2024-55637
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2024-55637
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2024-55637
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2024-55637
epss 0.00312 https://api.first.org/data/v1/epss?cve=CVE-2024-55637
epss 0.00312 https://api.first.org/data/v1/epss?cve=CVE-2024-55637
epss 0.00312 https://api.first.org/data/v1/epss?cve=CVE-2024-55637
epss 0.00312 https://api.first.org/data/v1/epss?cve=CVE-2024-55637
epss 0.00312 https://api.first.org/data/v1/epss?cve=CVE-2024-55637
epss 0.00312 https://api.first.org/data/v1/epss?cve=CVE-2024-55637
epss 0.00312 https://api.first.org/data/v1/epss?cve=CVE-2024-55637
epss 0.00312 https://api.first.org/data/v1/epss?cve=CVE-2024-55637
epss 0.00312 https://api.first.org/data/v1/epss?cve=CVE-2024-55637
epss 0.00356 https://api.first.org/data/v1/epss?cve=CVE-2024-55637
epss 0.0043 https://api.first.org/data/v1/epss?cve=CVE-2024-55637
epss 0.0043 https://api.first.org/data/v1/epss?cve=CVE-2024-55637
epss 0.0043 https://api.first.org/data/v1/epss?cve=CVE-2024-55637
epss 0.0043 https://api.first.org/data/v1/epss?cve=CVE-2024-55637
epss 0.0043 https://api.first.org/data/v1/epss?cve=CVE-2024-55637
epss 0.0043 https://api.first.org/data/v1/epss?cve=CVE-2024-55637
epss 0.0043 https://api.first.org/data/v1/epss?cve=CVE-2024-55637
epss 0.0043 https://api.first.org/data/v1/epss?cve=CVE-2024-55637
epss 0.0043 https://api.first.org/data/v1/epss?cve=CVE-2024-55637
epss 0.0043 https://api.first.org/data/v1/epss?cve=CVE-2024-55637
epss 0.0043 https://api.first.org/data/v1/epss?cve=CVE-2024-55637
epss 0.0043 https://api.first.org/data/v1/epss?cve=CVE-2024-55637
epss 0.0043 https://api.first.org/data/v1/epss?cve=CVE-2024-55637
epss 0.0043 https://api.first.org/data/v1/epss?cve=CVE-2024-55637
epss 0.0043 https://api.first.org/data/v1/epss?cve=CVE-2024-55637
epss 0.0043 https://api.first.org/data/v1/epss?cve=CVE-2024-55637
epss 0.0043 https://api.first.org/data/v1/epss?cve=CVE-2024-55637
epss 0.0043 https://api.first.org/data/v1/epss?cve=CVE-2024-55637
epss 0.0043 https://api.first.org/data/v1/epss?cve=CVE-2024-55637
epss 0.0043 https://api.first.org/data/v1/epss?cve=CVE-2024-55637
epss 0.0043 https://api.first.org/data/v1/epss?cve=CVE-2024-55637
epss 0.0043 https://api.first.org/data/v1/epss?cve=CVE-2024-55637
epss 0.0043 https://api.first.org/data/v1/epss?cve=CVE-2024-55637
epss 0.0043 https://api.first.org/data/v1/epss?cve=CVE-2024-55637
epss 0.0043 https://api.first.org/data/v1/epss?cve=CVE-2024-55637
epss 0.00523 https://api.first.org/data/v1/epss?cve=CVE-2024-55637
epss 0.00523 https://api.first.org/data/v1/epss?cve=CVE-2024-55637
epss 0.00523 https://api.first.org/data/v1/epss?cve=CVE-2024-55637
epss 0.00523 https://api.first.org/data/v1/epss?cve=CVE-2024-55637
epss 0.00523 https://api.first.org/data/v1/epss?cve=CVE-2024-55637
epss 0.00523 https://api.first.org/data/v1/epss?cve=CVE-2024-55637
epss 0.00523 https://api.first.org/data/v1/epss?cve=CVE-2024-55637
epss 0.00523 https://api.first.org/data/v1/epss?cve=CVE-2024-55637
epss 0.00523 https://api.first.org/data/v1/epss?cve=CVE-2024-55637
epss 0.00571 https://api.first.org/data/v1/epss?cve=CVE-2024-55637
epss 0.00571 https://api.first.org/data/v1/epss?cve=CVE-2024-55637
epss 0.00571 https://api.first.org/data/v1/epss?cve=CVE-2024-55637
epss 0.00571 https://api.first.org/data/v1/epss?cve=CVE-2024-55637
epss 0.00571 https://api.first.org/data/v1/epss?cve=CVE-2024-55637
epss 0.00571 https://api.first.org/data/v1/epss?cve=CVE-2024-55637
epss 0.00571 https://api.first.org/data/v1/epss?cve=CVE-2024-55637
epss 0.00571 https://api.first.org/data/v1/epss?cve=CVE-2024-55637
epss 0.00571 https://api.first.org/data/v1/epss?cve=CVE-2024-55637
epss 0.00571 https://api.first.org/data/v1/epss?cve=CVE-2024-55637
epss 0.00571 https://api.first.org/data/v1/epss?cve=CVE-2024-55637
epss 0.00571 https://api.first.org/data/v1/epss?cve=CVE-2024-55637
epss 0.00571 https://api.first.org/data/v1/epss?cve=CVE-2024-55637
epss 0.00571 https://api.first.org/data/v1/epss?cve=CVE-2024-55637
epss 0.00571 https://api.first.org/data/v1/epss?cve=CVE-2024-55637
epss 0.00809 https://api.first.org/data/v1/epss?cve=CVE-2024-55637
epss 0.01809 https://api.first.org/data/v1/epss?cve=CVE-2024-55637
epss 0.01809 https://api.first.org/data/v1/epss?cve=CVE-2024-55637
epss 0.01809 https://api.first.org/data/v1/epss?cve=CVE-2024-55637
epss 0.01809 https://api.first.org/data/v1/epss?cve=CVE-2024-55637
epss 0.01809 https://api.first.org/data/v1/epss?cve=CVE-2024-55637
epss 0.01809 https://api.first.org/data/v1/epss?cve=CVE-2024-55637
epss 0.01809 https://api.first.org/data/v1/epss?cve=CVE-2024-55637
epss 0.01809 https://api.first.org/data/v1/epss?cve=CVE-2024-55637
epss 0.01809 https://api.first.org/data/v1/epss?cve=CVE-2024-55637
epss 0.01809 https://api.first.org/data/v1/epss?cve=CVE-2024-55637
epss 0.01809 https://api.first.org/data/v1/epss?cve=CVE-2024-55637
epss 0.01809 https://api.first.org/data/v1/epss?cve=CVE-2024-55637
epss 0.01809 https://api.first.org/data/v1/epss?cve=CVE-2024-55637
epss 0.01809 https://api.first.org/data/v1/epss?cve=CVE-2024-55637
epss 0.01809 https://api.first.org/data/v1/epss?cve=CVE-2024-55637
cvssv3.1_qr HIGH https://github.com/advisories/GHSA-w6rx-9g2x-mg5g
cvssv3.1 9.8 https://github.com/drupal/core
generic_textual HIGH https://github.com/drupal/core
cvssv3.1 9.8 https://github.com/drupal/core/commit/1664030d399c73b4144f410f2ccc68c66a947f8d
generic_textual HIGH https://github.com/drupal/core/commit/1664030d399c73b4144f410f2ccc68c66a947f8d
cvssv3.1 9.8 https://nvd.nist.gov/vuln/detail/CVE-2024-55637
generic_textual HIGH https://nvd.nist.gov/vuln/detail/CVE-2024-55637
cvssv3.1 9.8 https://www.drupal.org/sa-core-2024-007
generic_textual HIGH https://www.drupal.org/sa-core-2024-007
ssvc Track https://www.drupal.org/sa-core-2024-007
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://github.com/drupal/core
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://github.com/drupal/core/commit/1664030d399c73b4144f410f2ccc68c66a947f8d
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2024-55637
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://www.drupal.org/sa-core-2024-007
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-12-10T21:20:25Z/ Found at https://www.drupal.org/sa-core-2024-007
Exploit Prediction Scoring System (EPSS)
Percentile 0.10788
EPSS Score 0.00043
Published At Dec. 11, 2024, midnight
Date Actor Action Source VulnerableCode Version
2024-12-11T16:38:55.409329+00:00 GithubOSV Importer Import https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/12/GHSA-w6rx-9g2x-mg5g/GHSA-w6rx-9g2x-mg5g.json 35.0.0