Search for vulnerabilities
Vulnerability details: VCID-tmu9-vjgy-aaab
Vulnerability ID VCID-tmu9-vjgy-aaab
Aliases CVE-2018-7602
GHSA-297x-j9pm-xjgg
Summary A remote code execution vulnerability exists within multiple subsystems of Drupal 7.x and 8.x. This potentially allows attackers to exploit multiple attack vectors on a Drupal site, which could result in the site being compromised. This vulnerability is related to Drupal core - Highly critical - Remote Code Execution - SA-CORE-2018-002. Both SA-CORE-2018-002 and this vulnerability are being exploited in the wild.
Status Published
Exploitability 2.0
Weighted Severity 9.0
Risk 10.0
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
epss 0.94287 https://api.first.org/data/v1/epss?cve=CVE-2018-7602
epss 0.94316 https://api.first.org/data/v1/epss?cve=CVE-2018-7602
epss 0.94316 https://api.first.org/data/v1/epss?cve=CVE-2018-7602
epss 0.94316 https://api.first.org/data/v1/epss?cve=CVE-2018-7602
epss 0.94316 https://api.first.org/data/v1/epss?cve=CVE-2018-7602
epss 0.94333 https://api.first.org/data/v1/epss?cve=CVE-2018-7602
epss 0.94333 https://api.first.org/data/v1/epss?cve=CVE-2018-7602
epss 0.94424 https://api.first.org/data/v1/epss?cve=CVE-2018-7602
epss 0.94424 https://api.first.org/data/v1/epss?cve=CVE-2018-7602
epss 0.94424 https://api.first.org/data/v1/epss?cve=CVE-2018-7602
epss 0.94424 https://api.first.org/data/v1/epss?cve=CVE-2018-7602
epss 0.94426 https://api.first.org/data/v1/epss?cve=CVE-2018-7602
epss 0.94426 https://api.first.org/data/v1/epss?cve=CVE-2018-7602
epss 0.94436 https://api.first.org/data/v1/epss?cve=CVE-2018-7602
epss 0.94436 https://api.first.org/data/v1/epss?cve=CVE-2018-7602
epss 0.94436 https://api.first.org/data/v1/epss?cve=CVE-2018-7602
epss 0.97003 https://api.first.org/data/v1/epss?cve=CVE-2018-7602
epss 0.97003 https://api.first.org/data/v1/epss?cve=CVE-2018-7602
epss 0.97003 https://api.first.org/data/v1/epss?cve=CVE-2018-7602
epss 0.97136 https://api.first.org/data/v1/epss?cve=CVE-2018-7602
epss 0.97136 https://api.first.org/data/v1/epss?cve=CVE-2018-7602
cvssv3.1_qr CRITICAL https://github.com/advisories/GHSA-297x-j9pm-xjgg
cvssv3.1 6.5 https://github.com/drupal/core
generic_textual CRITICAL https://github.com/drupal/core
cvssv3.1 9.8 https://github.com/FriendsOfPHP/security-advisories/blob/master/drupal/core/CVE-2018-7602.yaml
generic_textual CRITICAL https://github.com/FriendsOfPHP/security-advisories/blob/master/drupal/core/CVE-2018-7602.yaml
cvssv3.1 9.8 https://github.com/FriendsOfPHP/security-advisories/blob/master/drupal/drupal/CVE-2018-7602.yaml
generic_textual CRITICAL https://github.com/FriendsOfPHP/security-advisories/blob/master/drupal/drupal/CVE-2018-7602.yaml
cvssv3.1 9.8 https://lists.debian.org/debian-lts-announce/2018/04/msg00030.html
generic_textual CRITICAL https://lists.debian.org/debian-lts-announce/2018/04/msg00030.html
ssvc Act https://lists.debian.org/debian-lts-announce/2018/04/msg00030.html
cvssv2 7.5 https://nvd.nist.gov/vuln/detail/CVE-2018-7602
cvssv3 9.8 https://nvd.nist.gov/vuln/detail/CVE-2018-7602
cvssv3.1 9.8 https://nvd.nist.gov/vuln/detail/CVE-2018-7602
archlinux Critical https://security.archlinux.org/AVG-679
cvssv3.1 9.8 https://www.debian.org/security/2018/dsa-4180
generic_textual CRITICAL https://www.debian.org/security/2018/dsa-4180
ssvc Act https://www.debian.org/security/2018/dsa-4180
cvssv3.1 9.8 https://www.drupal.org/sa-core-2018-004
generic_textual CRITICAL https://www.drupal.org/sa-core-2018-004
ssvc Act https://www.drupal.org/sa-core-2018-004
cvssv3.1 9.8 https://www.exploit-db.com/exploits/44542
generic_textual CRITICAL https://www.exploit-db.com/exploits/44542
cvssv3.1 9.8 https://www.exploit-db.com/exploits/44542/
ssvc Act https://www.exploit-db.com/exploits/44542/
cvssv3.1 9.8 https://www.exploit-db.com/exploits/44557
generic_textual CRITICAL https://www.exploit-db.com/exploits/44557
cvssv3.1 9.8 https://www.exploit-db.com/exploits/44557/
cvssv3.1 9.8 https://www.exploit-db.com/exploits/44557/
ssvc Act https://www.exploit-db.com/exploits/44557/
ssvc Act https://www.exploit-db.com/exploits/44557/
cvssv3.1 9.8 http://www.securityfocus.com/bid/103985
generic_textual CRITICAL http://www.securityfocus.com/bid/103985
ssvc Act http://www.securityfocus.com/bid/103985
cvssv3.1 9.8 http://www.securitytracker.com/id/1040754
generic_textual CRITICAL http://www.securitytracker.com/id/1040754
ssvc Act http://www.securitytracker.com/id/1040754
Reference id Reference type URL
https://api.first.org/data/v1/epss?cve=CVE-2018-7602
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7602
https://github.com/drupal/core
https://github.com/FriendsOfPHP/security-advisories/blob/master/drupal/core/CVE-2018-7602.yaml
https://github.com/FriendsOfPHP/security-advisories/blob/master/drupal/drupal/CVE-2018-7602.yaml
https://lists.debian.org/debian-lts-announce/2018/04/msg00030.html
https://www.debian.org/security/2018/dsa-4180
https://www.drupal.org/sa-core-2018-004
https://www.exploit-db.com/exploits/44542
https://www.exploit-db.com/exploits/44542/
https://www.exploit-db.com/exploits/44557
https://www.exploit-db.com/exploits/44557/
http://www.securityfocus.com/bid/103985
http://www.securitytracker.com/id/1040754
896701 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=896701
ASA-201804-10 https://security.archlinux.org/ASA-201804-10
AVG-679 https://security.archlinux.org/AVG-679
cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
CVE-2018-7602 Exploit https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/44557.rb
CVE-2018-7602 https://nvd.nist.gov/vuln/detail/CVE-2018-7602
CVE-2018-7602;SA-CORE-2018-004 Exploit https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/44542.txt
CVE-2018-7602;SA-CORE-2018-004 Exploit https://pastebin.com/pRM8nmwj
GHSA-297x-j9pm-xjgg https://github.com/advisories/GHSA-297x-j9pm-xjgg
USN-USN-4773-1 https://usn.ubuntu.com/USN-4773-1/
Data source Exploit-DB
Date added April 26, 2018
Description Drupal < 7.58 - 'Drupalgeddon3' (Authenticated) Remote Code Execution (PoC)
Ransomware campaign use Known
Source publication date April 25, 2018
Exploit type webapps
Platform php
Source update date Nov. 17, 2018
Source URL https://pastebin.com/pRM8nmwj
Data source KEV
Date added April 13, 2022
Description A remote code execution vulnerability exists within multiple subsystems of Drupal that can allow attackers to exploit multiple attack vectors on a Drupal site.
Required action Apply updates per vendor instructions.
Due date May 4, 2022
Note
https://nvd.nist.gov/vuln/detail/CVE-2018-7602
Ransomware campaign use Known
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N Found at https://github.com/drupal/core
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://github.com/FriendsOfPHP/security-advisories/blob/master/drupal/core/CVE-2018-7602.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://github.com/FriendsOfPHP/security-advisories/blob/master/drupal/drupal/CVE-2018-7602.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://lists.debian.org/debian-lts-announce/2018/04/msg00030.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T12:39:15Z/ Found at https://lists.debian.org/debian-lts-announce/2018/04/msg00030.html
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2018-7602
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2018-7602
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2018-7602
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://www.debian.org/security/2018/dsa-4180
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T12:39:15Z/ Found at https://www.debian.org/security/2018/dsa-4180
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://www.drupal.org/sa-core-2018-004
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T12:39:15Z/ Found at https://www.drupal.org/sa-core-2018-004
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://www.exploit-db.com/exploits/44542
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://www.exploit-db.com/exploits/44542/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T12:39:15Z/ Found at https://www.exploit-db.com/exploits/44542/
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://www.exploit-db.com/exploits/44557
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://www.exploit-db.com/exploits/44557/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://www.exploit-db.com/exploits/44557/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T12:39:15Z/ Found at https://www.exploit-db.com/exploits/44557/

Vector: SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T12:39:15Z/ Found at https://www.exploit-db.com/exploits/44557/
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at http://www.securityfocus.com/bid/103985
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T12:39:15Z/ Found at http://www.securityfocus.com/bid/103985
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at http://www.securitytracker.com/id/1040754
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T12:39:15Z/ Found at http://www.securitytracker.com/id/1040754
Exploit Prediction Scoring System (EPSS)
Percentile 0.99931
EPSS Score 0.94287
Published At June 3, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.