Biztonsági figyelmeztetések
OAuth2 Server - Moderately critical - Access bypass - SA-CONTRIB-2025-020
Provides OAuth2 server functionality based on the oauth2-server-php library.
The module does not consistently enforce admin configurations allowing users on a disabled server to still authenticate.
Solution:Install the latest version:
- If you use the OAuth2 server module for Drupal 2.x, upgrade to OAuth2 server 2.1.0
- cafuego
- Lee Rowlands (larowlan) of the Drupal Security Team
- Greg Knaddison (greggles) of the Drupal Security Team
Cache Utility - Moderately critical - Cross Site Request Forgery - SA-CONTRIB-2025-019
The Cache Utility module provides an ability to view status and flush various caches.
The module doesn't sufficiently protect against Cross Site Request Forgery (CSRF) attacks by validating user identity and intent when flushing a cache.
Solution:Install the latest version:
- If you use the Cache Utility module for Drupal 1.2.x, upgrade to Cache Utility 1.2.1
- If you use the Cache Utility module for Drupal 1.x, you can also upgrade to Cache Utility 1.3.0
- Greg Knaddison (greggles) of the Drupal Security Team
General Data Protection Regulation - Moderately critical - Cross Site Request Forgery - SA-CONTRIB-2025-018
The GDPR Task submodule enables you to create GDPR tasks.
The module doesn't sufficiently protect against Cross Site Request Forgery (CSRF) attacks by validating user identity and intent when creating tasks.
Solution:Install the latest version:
- If you use the General Data Protection Regulation module 3.0.x, upgrade to 3.0.1
- If you use the General Data Protection Regulation module 3.1.x, upgrade to 3.1.2
- Greg Knaddison (greggles) of the Drupal Security Team
Drupal core - Moderately critical - Gadget Chain - SA-CORE-2025-003
Drupal core contains a potential PHP Object Injection vulnerability that (if combined with another exploit) could lead to Arbitrary File Inclusion. Techniques exist to escalate this attack to Remote Code Execution. It is not directly exploitable.
This issue is mitigated by the fact that in order for it to be exploitable, a separate vulnerability must be present to allow an attacker to pass unsafe input to unserialize(). There are no such known exploits in Drupal core.
Solution:Install the latest version:
- If you use Drupal 10.3.x, update to Drupal 10.3.13
- If you use Drupal 10.4.x, update to Drupal 10.4.3
- If you use Drupal 11.0.x, update to Drupal 11.0.12
- If you use Drupal 11.1.x, update to Drupal 11.1.3
All versions of Drupal 10 prior to 10.3 are end-of-life and do not receive security coverage. (Drupal 8 and Drupal 9 have both reached end-of-life.)
Reported By: Fixed By:- ghost of drupal past
- Dave Long (longwave) of the Drupal Security Team
- Drew Webber (mcdruid) of the Drupal Security Team
- nicxvan
- shin24
Drupal core - Moderately critical - Access bypass - SA-CORE-2025-002
Bulk operations allow authorized users to modify several nodes at once from the Content page (/admin/content). A site builder can also add bulk operations to other pages using Views.
A bug in the core Actions system allows some users to modify some fields using bulk actions that they do not have permission to modify on individual nodes.
This vulnerability is mitigated by the fact that an attacker must have permission to access /admin/content or other, custom views and to edit nodes.
In particular, the bulk operations
- Make content sticky
- Make content unsticky
- Promote content to front page
- Publish content
- Remove content from front page
- Unpublish content
now require the "Administer content" permission.
Solution:Install the latest version:
- If you are using Drupal 10.3, update to Drupal 10.3.13.
- If you are using Drupal 10.4, update to Drupal 10.4.3.
- If you are using Drupal 11.0, update to Drupal 11.0.12.
- If you are using Drupal 11.1, update to Drupal 11.1.3.
All versions of Drupal 10 prior to 10.3 are end-of-life and do not receive security coverage. (Drupal 8 and Drupal 9 have both reached end-of-life.)
Reported By: Fixed By:- Benji Fisher (benjifisher) of the Drupal Security Team
- jeff cardwell
- Mingsong (mingsong) Provisional Member of the Drupal Security Team
- Juraj Nemec (poker10) of the Drupal Security Team
Drupal core - Critical - Cross site scripting - SA-CORE-2025-001
Drupal core doesn't sufficiently filter error messages under certain circumstances, leading to a reflected Cross Site Scripting vulnerability (XSS).
Sites are encouraged to update. There are not yet public documented steps to exploit this, but there may be soon given the nature of this issue.
This issue is being protected by Drupal Steward. Sites that use Drupal Steward are already protected, but are still encouraged to upgrade in the near future.
Solution:Install the latest version:
- If you use Drupal 10.3.x, update to Drupal 10.3.13
- If you use Drupal 10.4.x, update to Drupal 10.4.3
- If you use Drupal 11.0.x, update to Drupal 11.0.12
- If you use Drupal 11.1.x, update to Drupal 11.1.3
All versions of Drupal 10 prior to 10.3 are end-of-life and do not receive security coverage. (Drupal 8 and Drupal 9 have both reached end-of-life.)
Reported By:- Arne (arkepp)
- bdanin
- Douglas Groene (dgroene)
- Dragos Dumitrescu (dragos-dumi)
- Flo Kosiol (flokosiol)
- Gerardo Cadau (juanramonperez)
- Justin Christoffersen (larsdesigns)
- nuwans
- Sven Decabooter (svendecabooter)
- Will Gunn (wgunn_e)
- catch (catch) of the Drupal Security Team
- Drew Webber (mcdruid) of the Drupal Security
Team
Configuration Split - Moderately critical - Cross Site Request Forgery - SA-CONTRIB-2025-017
This module enables you to create super sets of configuration and enable them conditionally, for example have some modules installed only in some environments.
The module does not use Cross Site Request Forgery (CSRF) tokens to protect routes for enabling or disabling a split.
This vulnerability is mitigated by the fact that an attacker must know the machine name of a split and deceive a user with the permission to modify it.
The status only takes effect when exporting the configuration (1.x and 2.x) or importing the configuration (1.x only) and the status is not fixed via configuration override, which is the typical setup.
Install the latest version:
- If you use the Config Split module 8.x-1.x, upgrade to Config Split 8.x-1.10
- If you use the Config Split module 2.0.x, upgrade to Config Split 2.0.2
- Greg Knaddison (greggles) of the Drupal Security Team
SpamSpan filter - Moderately critical - Cross Site Scripting - SA-CONTRIB-2025-016
This module enables your site to obfuscate Email addresses and prevent spambots to collect them.
The module doesn't sanitize HTML data attributes when an email address link is transformed to separate span HTML elements and then transformed back by JavaScript leading to a Cross Site Scripting (XSS) vulnerability.
This is mitigated by the fact an attacker must be able to insert span HTML elements with data attributes in the page.
Solution:Install the latest version:
- If you use the Spamspan filter module for Drupal 10.x, upgrade to Spamspan filter 3.2.1
- Greg Knaddison (greggles) of the Drupal Security Team
Open Social - Less critical - Access bypass, Information Disclosure - SA-CONTRIB-2025-015
Open Social is a Drupal distribution for online communities, which ships with a default module to invite users to groups and events.
Invites for a specific user can be seen under certain conditions.
The issue is mitigated for events by the fact that social_event_max_enroll has to be enabled.
Solution:Install the latest version:
- If you use Open Social 12.3.x upgrade to Open Social 12.3.11
- If you use Open Social 12.4.x upgrade to Open Social 12.4.10
- Greg Knaddison (greggles) of the Drupal Security Team
Open Social - Moderately critical - Access bypass - SA-CONTRIB-2025-014
Open Social is a Drupal distribution for online communities, which ships with a default (optional) module social_language to make your platform multilingual.
Some site administration configuration does not correctly check access when trying to translate allowing unauthorised people to translate these parts.
The issue is mitigated by the fact that social_language needs to be enabled with more than 1 language.
Solution:Install the latest version:
- If you use Open Social 12.3.x upgrade to Open Social 12.3.11
- If you use Open Social 12.4.x upgrade to Open Social 12.4.10
- Greg Knaddison (greggles) of the Drupal Security Team
OAuth2 Client - Moderately critical - Cross Site Request Forgery - SA-CONTRIB-2025-013
This module enables a developer to create dedicated OAuth2 clients for connecting to external APIs and other OAuth protected resources.
The module does not use Cross Site Request Forgery (CSRF) tokens to protect routes for enabling a client.
This vulnerability is mitigated by the fact that an attacker must know the machine name of the client and deceive another user with this permission.
Solution:Install the latest version:
- If you use the Oauth2 Client module for Drupal 10 or 11, upgrade to Oauth2 Client 4.1.3
- cilefen of the Drupal Security Team
- Greg Knaddison of the Drupal Security Team
Google Tag - Moderately critical - Cross Site Request Forgery - SA-CONTRIB-2025-012
This module enables you to integrate the site with the Google Tag Manager (GTM) application.
The module doesn't sufficiently validate the enabling or disabling of a tag container. The routes involved are not protected against Cross Site Request Forgery (CSRF).
This vulnerability is mitigated by the fact that an attacker needs to know the machine name of the container. The machine name is a random string, making an attack more difficult.
Solution:Install the latest version:
- If you use the Google Tag module 8.x, upgrade to Google Tag 8.x-1.8
- If you use the Google Tag module 2.0.x, upgrade to Google Tag 2.0.8
- Greg Knaddison of the Drupal Security Team
- Juraj Nemec of the Drupal Security Team
Google Tag - Moderately critical - Cross Site Scripting - SA-CONTRIB-2025-011
This module enables you to integrate the site with the Google Tag Manager (GTM) application.
The module doesn't have the "restrict access" flag on the "administer google_tag_container" permission. A user with this permission can load a GTM container that completely changes the page or inserts malicious JS, resulting in a cross site scripting vulnerability.
This vulnerability is mitigated by the fact that an attacker must have a role with the aforementioned permission.
Solution:Install the latest version:
- If you use the Google Tag module 8.x, upgrade to Google Tag 8.x-1.8
- If you use the Google Tag module 2.0.x, upgrade to Google Tag 2.0.8
- Greg Knaddison of the Drupal Security Team
- Juraj Nemec of the Drupal Security Team
Drupal Admin LTE theme - Critical - Unsupported - SA-CONTRIB-2025-010
The security team is marking this project unsupported. There is a known security issue with the project that has not been fixed by the maintainer. If you would like to maintain this project, please read: https://www.drupal.org/node/251466#s-becoming-owner-maintainer-or-co-mai...
Solution:If you use this project, you should uninstall it. To take over maintainership, please read https://www.drupal.org/node/251466#s-becoming-owner-maintainer-or-co-mai...
Authenticator Login - Critical - Access bypass - SA-CONTRIB-2025-009
This module allows a site to setup two factor authentication via QR code using authenticator applications on mobile devices including phones.
The module does not properly protect its custom paths, allowing one user to access a different user's two factor configuration.
Solution:Install the latest version:
- If you use the alogin module 1.0.x, upgrade to at least Authenticator Login 2.0.6 or more recent, as the 1.0.x branch is now unsupported
- If you use the alogin module 2.0.x, upgrade to at least Authenticator Login 2.0.6 or more recent
- If you use the alogin module 2.1.x, you do not need to do anything
- Damien McKenna of the Drupal Security Team
- Ivo Van Geertruyen of the Drupal Security Team
- Juraj Nemec of the Drupal Security Team
Matomo Analytics - Moderately critical - Cross site request forgery - SA-CONTRIB-2025-008
This module enables you to add the Matomo web statistics tracking system to your website.
The Matomo Analytics Tag Manager sub-module allows you to add one or more Matomo tag containers on your website.
The module does not protect against Cross Site Request Forgeries on routes to enable or disable containers.
This vulnerability is mitigated by the fact that:
- The website needs to have the submodule "Matomo Analytics Tag Manager" enabled.
- An attacker must know the machine name of the container.
Install the latest version:
- If you use the Matomo Analytics module 8.x-1.23 and below, upgrade to Matomo Analytics 8.x-1.24
- Ivo Van Geertruyen of the Drupal Security Team
- Ivo Van Geertruyen of the Drupal Security Team
- Florent Torregrosa
- Ivo Van Geertruyen of the Drupal Security Team
Ignition Error Pages - Critical - Cross Site Scripting - SA-CONTRIB-2025-007
This module enables you to render error pages using the Ignition package.
The module disables certain Drupal core code and does not perform sufficient filtering, allowing HTML to be injected in certain situations leading to a Cross Site Scripting (XSS) vulnerability.
This vulnerability is mitigated by the fact that this module is for development purposes and is not intended to be installed on production environments.
Solution:Install the latest version:
- If you use the Ignition Error Pages module for Drupal 10/11, upgrade to Ignition Error Pages 1.0.4
- catch of the Drupal Security Team
- Dieter Holvoet
- Heine Deelstra of the Drupal Security Team
- Greg Knaddison of the Drupal Security Team
- Juraj Nemec of the Drupal Security Team
- James Gilliland of the Drupal Security Team
Material Admin - Critical - Unsupported - SA-CONTRIB-2025-006
The security team is marking this project unsupported. There is a known security issue with the project that has not been fixed by the maintainer. If you would like to maintain this project, please read: https://www.drupal.org/node/251466#s-becoming-owner-maintainer-or-co-mai...
Solution:If you use this project, you should uninstall it. To take over maintainership, please read https://www.drupal.org/node/251466#s-becoming-owner-maintainer-or-co-mai...
Flattern – Multipurpose Bootstrap Business Profile - Critical - Unsupported - SA-CONTRIB-2025-005
The security team is marking this project unsupported. There is a known security issue with the project that has not been fixed by the maintainer. If you would like to maintain this project, please read: https://www.drupal.org/node/251466#s-becoming-owner-maintainer-or-co-mai...
Solution:If you use this project, you should uninstall it. To take over maintainership, please read https://www.drupal.org/node/251466#s-becoming-owner-maintainer-or-co-mai...
AI (Artificial Intelligence) - Moderately critical - Access bypass, Information Disclosure - SA-CONTRIB-2025-004
The AI logging sub-module enables you to log AI requests and responses for debugging and auditing purposes.
The module doesn't sufficiently check for access to view the preview listing of the logs. Full log details are correctly protected, and API keys are never logged.
This vulnerability is mitigated by the fact that it only affects sites using the AI Logging sub-module with 'Log requests' enabled in the AI Logging configuration page.
Solution:Install the latest version:
- If you use AI 1.x, upgrade to AI 1.0.3.
An update hook will update the view to use the view ai log permission. If you use version controlled configuration, remember to capture this.
(or) Disable the AI Logging module.
(or) Manually update the ai_logs view's access check to use the view ai log permission.
Reported By: Fixed By: Coordinated By:- Greg Knaddison of the Drupal Security Team
- Juraj Nemec of the Drupal Security Team
- Dave Long of the Drupal Security Team