Startseite
  • » Home
  • » Handbuch & FAQ
  • » Forum
  • » Übersetzungsserver
  • » Suche
Startseite › Newsfeed-Generator › Herkunft ›

Drupal Contrib Security

Inhalt abgleichen
URL: https://www.drupal.org/security/contrib
Aktualisiert: vor 12 Minuten

Obfuscate - Moderately critical - Cross-site scripting - SA-CONTRIB-2026-033

22 April, 2026 - 19:47
Project: ObfuscateDate: 2026-April-22Security risk: Moderately critical 12 ∕ 25 AC:Basic/A:User/CI:Some/II:Some/E:Theoretical/TD:UncommonVulnerability: Cross-site scriptingAffected versions: <2.0.2CVE IDs: CVE-2026-6871Description: 

This module enables you to obfuscate email addresses in content.

The module doesn't sufficiently sanitize user input via the Twig filter.

This vulnerability is mitigated by the fact that it only affects sites using the ROT13 encoding and where an attacker can enter content that is filtered using the module's Twig filter.

Solution: 

Install the latest version:

  • If you use the Obfuscate module, upgrade to Obfuscate 2.0.2
Reported By: 
  • Pierre Rudloff (prudloff) of the Drupal Security Team
Fixed By: 
  • Christophe Jossart (colorfield)
  • Nigel Cunningham (nigelcunningham)
Coordinated By: 
  • Greg Knaddison (greggles) of the Drupal Security Team
  • Juraj Nemec (poker10) of the Drupal Security Team
  • Pierre Rudloff (prudloff) of the Drupal Security Team
Kategorien: Drupal Security

Orejime - Moderately critical - Cross-site scripting - SA-CONTRIB-2026-032

8 April, 2026 - 18:09
Project: OrejimeDate: 2026-April-08Security risk: Moderately critical 13 ∕ 25 AC:Basic/A:User/CI:Some/II:Some/E:Theoretical/TD:DefaultVulnerability: Cross-site scriptingAffected versions: <2.0.16CVE IDs: CVE-2026-6095Description: 

The IframeConsent element writes HTML attributes without escaping their value.

This module has a XSS vulnerability. If an attacker is able to write an <iframe-consent> tag, they may be able to insert arbitrary JavaScript.

This vulnerability is mitigated by the fact that a text format that allows iframe-consent HTML tags with alt attributes in the necessary option (Enable JS Iframe consent) must be enabled, and an attacker must have a role allowing the creation or modification of content in a field with text the format.

Solution: 

Install the latest version:

  • If you use the 2.x branch of Orejime, upgrade to Orejime 2.0.16.
Reported By: 
  • Pierre Rudloff (prudloff) of the Drupal Security Team
Fixed By: 
  • Fabien Gutknecht (fabsgugu)
  • Pierre Rudloff (prudloff) of the Drupal Security Team
Coordinated By: 
  • Juraj Nemec (poker10) of the Drupal Security Team
  • Pierre Rudloff (prudloff) of the Drupal Security Team
  • Jess (xjm) of the Drupal Security Team
Kategorien: Drupal Security

SAML SSO - Service Provider - Critical - Authentication bypass - SA-CONTRIB-2026-031

1 April, 2026 - 18:38
Project: SAML SSO - Service Provider Date: 2026-April-01Security risk: Critical 19 ∕ 25 AC:Complex/A:None/CI:All/II:All/E:Theoretical/TD:AllVulnerability: Authentication bypassAffected versions: <3.1.4CVE IDs: CVE-2026-5343Description: 

This module enables you to perform SAML-protocol-based single-sign-on (SSO) on a Drupal site.

The module doesn't sufficiently block access, leading to a authentication bypass vulnerability.

Solution: 

Install the latest version:

If you are using the SAML SSO - Service Provider module for Drupal, upgrade to SAML SSO - Service Provider 3.1.4.

Reported By: 
  • Tim de Jong | Freelance Drupal Developer (tim_dj)
Fixed By: 
  • Sudhanshu Dhage (sudhanshu0542)
Coordinated By: 
  • Damien McKenna (damienmckenna) of the Drupal Security Team
  • Greg Knaddison (greggles) of the Drupal Security Team
  • Juraj Nemec (poker10) of the Drupal Security Team
  • Jess (xjm) of the Drupal Security Team
Kategorien: Drupal Security

Automated Logout - Moderately critical - Cross-site request forgery - SA-CONTRIB-2026-030

18 März, 2026 - 18:10
Project: Automated LogoutDate: 2026-March-18Security risk: Moderately critical 10 ∕ 25 AC:Basic/A:None/CI:None/II:None/E:Theoretical/TD:AllVulnerability: Cross-site request forgeryAffected versions: <1.7.0 || >=2.0.0 <2.0.2CVE IDs: CVE-2026-4393Description: 

This module provides a site administrator the ability to log users out after a specified time of inactivity.

The module doesn't sufficiently protect its routes from cross-site request forgery (CSRF), allowing the logout route to be triggered without user interaction.

Solution: 

Install the latest version:

  • If you use Automated Logout 8.x-1.x version 8.x-1.6 or lower, upgrade to autologout 8.x-1.7.
  • If you use Automated Logout 2.x version 2.0.1 or lower, upgrade to autologout 2.0.2.
Reported By: 
  • Pierre Rudloff (prudloff)
Fixed By: 
  • Ajit Shinde (ajits)
  • Jakob P (japerry)
  • Gareth Alexander (the_g_bomb)
Coordinated By: 
  • Greg Knaddison (greggles) of the Drupal Security Team
  • Juraj Nemec (poker10) of the Drupal Security Team
  • Jess (xjm) of the Drupal Security Team
Kategorien: Drupal Security

Unpublished Node Permissions - Critical - Access bypass - SA-CONTRIB-2026-029

11 März, 2026 - 18:35
Project: Unpublished Node PermissionsDate: 2026-March-11Security risk: Critical 15 ∕ 25 AC:None/A:None/CI:Some/II:None/E:Theoretical/TD:AllVulnerability: Access bypassAffected versions: <1.7.0CVE IDs: CVE-2026-4933Description: 

This module creates permissions per node content type to control access to unpublished nodes per content type.

The module does not consistently control access for unpublished translated nodes.

Solution: 

Install the latest version:

  • If you use the Unpublished Node Permissions module, upgrade to Unpublished Node Permissions 8.x-1.7.
Reported By: 
  • Andre Groendijk (groendijk)
Fixed By: 
  • Fabien Gutknecht (fabsgugu)
Coordinated By: 
  • Greg Knaddison (greggles) of the Drupal Security Team
  • Juraj Nemec (poker10) of the Drupal Security Team
  • Jess (xjm) of the Drupal Security Team
Kategorien: Drupal Security

AI (Artificial Intelligence) - Moderately critical - Information Disclosure - SA-CONTRIB-2026-028

11 März, 2026 - 18:33
Project: AI (Artificial Intelligence)Date: 2026-March-11Security risk: Moderately critical 11 ∕ 25 AC:Complex/A:None/CI:Some/II:None/E:Theoretical/TD:DefaultVulnerability: Information DisclosureAffected versions: <1.1.11 || >=1.2.0 <1.2.12CVE IDs: CVE-2026-3573Description: 

The module and certain submodules (AI Automators, AI Translate, AI API Explorer, AI Content Suggestions) provide the ability to use an LLM to generate HTML or Markdown and preview it in a browser.

Under certain circumstances, rendering of this HTML can lead to exposing secret communications in the context of the LLM request.

Solution: 

Install the latest version:

  • If you use the AI module 1.1 or earlier, upgrade to AI 1.1.11.
  • If you use the AI module 1.2, upgrade to AI 1.2.12.
Reported By: 
  • Marcus Johansson (marcus_johansson)
Fixed By: 
  • Artem Dmitriiev (a.dmitriiev)
  • Abhisek Mazumdar (abhisekmazumdar)
  • Dave Long (longwave) of the Drupal Security Team
  • Marcus Johansson (marcus_johansson)
  • Valery Lourie (valthebald)
Coordinated By: 
  • Greg Knaddison (greggles) of the Drupal Security Team
  • Drew Webber (mcdruid) of the Drupal Security Team
  • Jess (xjm) of the Drupal Security Team
Kategorien: Drupal Security

OpenID Connect / OAuth client - Less critical - Access bypass - SA-CONTRIB-2026-027

4 März, 2026 - 20:02
Project: OpenID Connect / OAuth clientDate: 2026-March-04Security risk: Less critical 9 ∕ 25 AC:Complex/A:User/CI:Some/II:None/E:Theoretical/TD:DefaultVulnerability: Access bypassAffected versions: <1.5.0CVE IDs: CVE-2026-3532Description: 

This module enables you to use an external OpenID Connect login provider to authenticate and log in users on your site. If a user signs in with a login provider for the first time on the website, a new Drupal user will be created.

The module doesn't sufficiently validate the uniqueness of certain user fields depending on the database engine and its collation.

As a result, a user may be able to register with the same email address as another user.

This may lead to data integrity issues.

Solution: 

Install the latest version:

  • If you use the OpenID Connect 8.x-1.x module, upgrade to OpenID Connect 8.x-1.5

Updating OpenID Connect will not solve potential issues with existing accounts affected by this bug. See Fixing emails that vary only by case for additional guidance.

Reported By: 
  • Eric Smith (ericgsmith)
Fixed By: 
  • Philip Frilling (pfrilling)
Coordinated By: 
  • Greg Knaddison (greggles) of the Drupal Security Team
  • Drew Webber (mcdruid) of the Drupal Security Team
  • Juraj Nemec (poker10) of the Drupal Security Team
Kategorien: Drupal Security

OpenID Connect / OAuth client - Moderately critical - Access bypass - SA-CONTRIB-2026-026

4 März, 2026 - 20:02
Project: OpenID Connect / OAuth clientDate: 2026-March-04Security risk: Moderately critical 10 ∕ 25 AC:Complex/A:User/CI:Some/II:None/E:Theoretical/TD:AllVulnerability: Access bypassAffected versions: <1.5.0CVE IDs: CVE-2026-3531Description: 

This module enables you to use an external OpenID Connect login provider to authenticate and log in users on your site. If a user signs in with a login provider for the first time on the website, a new Drupal user will be created.

A visitor who successfully logs in to their Identity Provider and is denied access to Drupal through custom code or a server error will maintain their session at the Identity Provider, possibly leading to access bypass situations, especially in a shared computing environment.

Solution: 

Install the latest version:

  • If you use the OpenID Connect 8.x-1.x module, upgrade to OpenID Connect 8.x-1.5
Reported By: 
  • Kimberley Massey (kimberleycgm)
Fixed By: 
  • Kimberley Massey (kimberleycgm)
  • Philip Frilling (pfrilling)
Coordinated By: 
  • Damien McKenna (damienmckenna) of the Drupal Security Team
  • Greg Knaddison (greggles) of the Drupal Security Team
  • Juraj Nemec (poker10) of the Drupal Security Team
Kategorien: Drupal Security

OpenID Connect / OAuth client - Moderately critical - Server-side request forgery, Information disclosure - SA-CONTRIB-2026-025

4 März, 2026 - 20:00
Project: OpenID Connect / OAuth clientDate: 2026-March-04Security risk: Moderately critical 10 ∕ 25 AC:Basic/A:User/CI:Some/II:None/E:Theoretical/TD:DefaultVulnerability: Server-side request forgery, Information disclosureAffected versions: <1.5.0CVE IDs: CVE-2026-3530Description: 

This module enables you to use an external OpenID Connect login provider to authenticate and log in users on your site. If a user signs in with a login provider for the first time on the website, a new Drupal user will be created.

The module doesn't sufficiently validate certain fields coming from the identity provider, which could lead to SSRF and information disclosures.

This vulnerability is mitigated by:
- an attacker must have access to the identity provider to provide compromised data at the source profile.
- a site must have specific field mappings configured

Solution: 

Install the latest version:

  • If you use the OpenID Connect 8.x-1.x module upgrade to OpenID Connect 8.x-1.5
Reported By: 
  • Drew Webber (mcdruid) of the Drupal Security Team
Fixed By: 
  • Drew Webber (mcdruid) of the Drupal Security Team
  • Philip Frilling (pfrilling)
Coordinated By: 
  • Damien McKenna (damienmckenna) of the Drupal Security Team
  • Greg Knaddison (greggles) of the Drupal Security Team
  • Drew Webber (mcdruid) of the Drupal Security Team
  • Juraj Nemec (poker10) of the Drupal Security Team
Kategorien: Drupal Security

Google Analytics GA4 - Moderately critical - Cross-site Scripting - SA-CONTRIB-2026-024

4 März, 2026 - 19:59
Project: Google Analytics GA4Date: 2026-March-04Security risk: Moderately critical 12 ∕ 25 AC:Basic/A:Admin/CI:Some/II:Some/E:Theoretical/TD:DefaultVulnerability: Cross-site ScriptingAffected versions: <1.1.14CVE IDs: CVE-2026-3529Description: 

The Google Analytics GA4 module enables users to add custom attributes to the script tag used to load the Google Analytics library. The module does not sufficiently sanitize these attributes.

This vulnerability is mitigated by the fact that an attacker must have a role with the "ga4 configure" (or "administer google analytics ga4 settings") permission.

An attacker with this permission could inject malicious JavaScript via event handlers (such as onload) or override the script source, leading to a Cross-Site Scripting (XSS) attack on all pages where the GA4 script is loaded.

Note: this advisory initially suggested it was fixed in the 1.1.13 release, but the 1.1.13 releaes was missing the fix. Users of this module should switch to the 1.1.14 release.

Solution: 

Install the latest version:

  • If you use the Google Analytics GA4 module, upgrade to Google Analytics GA4 1.1.14
Reported By: 
  • Pierre Rudloff (prudloff) provisional member of the Drupal Security Team
Fixed By: 
  • Sujan Shrestha (sujan shrestha)
Coordinated By: 
  • Greg Knaddison (greggles) of the Drupal Security Team
  • Juraj Nemec (poker10) of the Drupal Security Team
Kategorien: Drupal Security

Calculation Fields - Moderately critical - Cross-site Scripting - SA-CONTRIB-2026-023

4 März, 2026 - 19:58
Project: Calculation FieldsDate: 2026-March-04Security risk: Moderately critical 14 ∕ 25 AC:Basic/A:None/CI:Some/II:Some/E:Theoretical/TD:UncommonVulnerability: Cross-site ScriptingAffected versions: <1.0.4CVE IDs: CVE-2026-3528Description: 

This module extends the Drupal form API adding "Calculation element" form element types, which can evaluate a maths expression. It offers webform integration.

The module doesn't sufficiently validate user input; this could be exploited to achieve Information Disclosure or Cross-site Scripting (XSS).

Solution: 

Install the latest version:

  • If you use the Calculation fields module, upgrade to Calculation fields 1.0.4
Reported By: 
  • Drew Webber (mcdruid) of the Drupal Security Team
Fixed By: 
  • Joao Paulo Constantino (joaopauloc.dev)
Coordinated By: 
  • Greg Knaddison (greggles) of the Drupal Security Team
  • Drew Webber (mcdruid) of the Drupal Security Team
  • Juraj Nemec (poker10) of the Drupal Security Team
Kategorien: Drupal Security

AJAX Dashboard - Critical - Access bypass - SA-CONTRIB-2026-022

4 März, 2026 - 19:57
Project: AJAX DashboardDate: 2026-March-04Security risk: Critical 17 ∕ 25 AC:None/A:None/CI:Some/II:Some/E:Theoretical/TD:DefaultVulnerability: Access bypassAffected versions: <3.1.0CVE IDs: CVE-2026-3527Description: 

AJAX Dashboard: Entity Dashboards enables you to create configurable dashboards attached to entities which include AJAX-reloading of a main content area based on inputs from a configurable set of buttons.

The module doesn't sufficiently check access on the dashboard configuration route. Unauthorized users could access the entity dashboard configuration page and either enable or disable dashboards. The affected administration page does not permit editing the configurations of the dashboards themselves.

The vulnerability is mitigated by the fact that the AJAX Dashboard Entity Dashboard submodule must be enabled.

Solution: 

Install the latest version of the AJAX Dashboard module, which includes the update to AJAX Dashboard: Entity Dashboards:

  • If you use the AJAX Dashboard module, upgrade to AJAX Dashboard 3.1.0
Reported By: 
  • Juraj Nemec (poker10) of the Drupal Security Team
Fixed By: 
  • Michael Nolan (laboratory.mike)
Coordinated By: 
  • Bram Driesen (bramdriesen) provisional member of the Drupal Security Team
  • Greg Knaddison (greggles) of the Drupal Security Team
  • Juraj Nemec (poker10) of the Drupal Security Team
Kategorien: Drupal Security

File Access Fix (deprecated) - Moderately critical - Access bypass - SA-CONTRIB-2026-021

4 März, 2026 - 19:56
Project: File Access Fix (deprecated)Date: 2026-March-04Security risk: Moderately critical 12 ∕ 25 AC:Basic/A:None/CI:Some/II:None/E:Theoretical/TD:DefaultVulnerability: Access bypassAffected versions: <1.2.0CVE IDs: CVE-2026-3526Description: 

This module moves files to and from private storage depending on the access of its owning entities.

The module does not always validate the access logic correctly, resulting in files attached to an entity not being protected in certain circumstances.

This vulnerability is mitigated by the fact that saving an entity a second time resolves the issue.

Solution: 

Install the latest version:

  • If you use the File access fix module, upgrade to File access fix 8.x-1.2
Reported By: 
  • Pierre Rudloff (prudloff) provisional member of the Drupal Security Team
Fixed By: 
  • Merlin Axel Rutz (geek-merlin)
Coordinated By: 
  • Damien McKenna (damienmckenna) of the Drupal Security Team
  • Greg Knaddison (greggles) of the Drupal Security Team
  • Juraj Nemec (poker10) of the Drupal Security Team
Kategorien: Drupal Security

File Access Fix (deprecated) - Moderately critical - Access bypass - SA-CONTRIB-2026-020

4 März, 2026 - 19:54
Project: File Access Fix (deprecated)Date: 2026-March-04Security risk: Moderately critical 11 ∕ 25 AC:Basic/A:None/CI:Some/II:None/E:Theoretical/TD:UncommonVulnerability: Access bypassAffected versions: <1.2.0CVE IDs: CVE-2026-3525Description: 

This module moves files to and from private storage depending on the access of its owning entities.
The module does not sufficiently incorporate the results of hook_file_download when a custom or contrib module implements that hook leading to access bypass.

Solution: 

Install the latest version:

  • If you use the File access fix module, upgrade to File access fix 8.x-1.2
Reported By: 
  • Pierre Rudloff (prudloff) provisional member of the Drupal Security Team
Fixed By: 
  • Merlin Axel Rutz (geek-merlin)
Coordinated By: 
  • Greg Knaddison (greggles) of the Drupal Security Team
  • Juraj Nemec (poker10) of the Drupal Security Team
Kategorien: Drupal Security

Responsive Favicons - Moderately critical - Cross-site scripting - SA-CONTRIB-2026-019

25 Februar, 2026 - 20:51
Project: Responsive FaviconsDate: 2026-February-25Security risk: Moderately critical 13 ∕ 25 AC:Basic/A:Admin/CI:Some/II:Some/E:Theoretical/TD:AllVulnerability: Cross-site scriptingAffected versions: <2.0.2CVE IDs: CVE-2026-3218Description: 

This module adds the favicons generated by realfavicongenerator.net to your Drupal site.

The module does not filter administrator-entered text, leading to a persistent Cross-site scripting (XSS) vulnerability.

This vulnerability is mitigated by the fact that an attacker must have a role with the permission "administer responsive favicons".

Solution: 

Install the latest version, then confirm the permissions associated with the module are assigned to appropriate roles.

  • If you use the Responsive Favicons module version 2.0.1 or lower, upgrade to Responsive Favicons 2.0.2.
  • 4.x and 3.x branches are not affected by this vulnerability.
Reported By: 
  • Simon Bäse (simonbaese)
Fixed By: 
  • Frank Mably (mably)
  • Sean Hamlin (wiifm)
Coordinated By: 
  • Greg Knaddison (greggles) of the Drupal Security Team
  • Juraj Nemec (poker10) of the Drupal Security Team
  • Jess (xjm) of the Drupal Security Team
Kategorien: Drupal Security

SAML SSO - Service Provider - Critical - Cross-site scripting - SA-CONTRIB-2026-018

25 Februar, 2026 - 20:51
Project: SAML SSO - Service Provider Date: 2026-February-25Security risk: Critical 16 ∕ 25 AC:Basic/A:None/CI:Some/II:Some/E:Theoretical/TD:AllVulnerability: Cross-site scriptingAffected versions: <3.1.3CVE IDs: CVE-2026-3217Description: 

This module enables you to perform SAML protocol-based single sign-on (SSO) on a Drupal site.

The module doesn't sufficiently sanitize user input, leading to a reflected Cross-site scripting (XSS) vulnerability.

Solution: 

Install the latest version:

  • If you are using the "SAML SSO- Service Provider" module for Drupal, upgrade to SAML SSO- Service Provider 3.1.3.
Reported By: 
  • Drew Webber (mcdruid) of the Drupal Security Team
Fixed By: 
  • Sudhanshu Dhage (sudhanshu0542)
Coordinated By: 
  • Drew Webber (mcdruid) of the Drupal Security Team
  • Juraj Nemec (poker10) of the Drupal Security Team
  • Jess (xjm) of the Drupal Security Team
Kategorien: Drupal Security

Drupal Canvas - Moderately critical - Server-side request forgery, Information disclosure - SA-CONTRIB-2026-017

25 Februar, 2026 - 20:51
Project: Drupal CanvasDate: 2026-February-25Security risk: Moderately critical 11 ∕ 25 AC:Basic/A:User/CI:Some/II:None/E:Theoretical/TD:AllVulnerability: Server-side request forgery, Information disclosureAffected versions: <1.1.1CVE IDs: CVE-2026-3216Description: 

This module enables you to easily theme and build an entire website using only their browser, without the need to write code beyond basic JSX and CSS. Content creators are able to compose content on any part of the page without relying on developers.

The project has a hidden sub-module, Drupal Canvas AI, which is disabled by default. It is typically enabled as a dependency by Drupal Recipes or enabled directly via deployment scripts (e.g., Drush). When the submodule is enabled, the following vulnerability is exposed.

The module doesn't sufficiently sanitize user-supplied data via crafted API requests within the messages JSON payload.

It is mitigated by the fact that an attacker must have a role with the permission "use Drupal Canvas AI".

How the Canvas AI sub-module gets enabled: As a hidden submodule, canvas_ai is not intended for manual activation via the UI. It is designed to be pulled in as a dependency by Drupal Recipes or enabled directly via deployment scripts (e.g., Drush).

Solution: 

Install the latest version:

  • If you use the Drupal Canvas module, upgrade to Drupal Canvas 1.1.1 .

Sites witthout the hidden submodule enabled are not vulnerable. The module is hidden from the UI module list, but admins can verify its status via the command line: drush config:get core.extension | grep canvas_ai

Reported By: 
  • Drew Webber (mcdruid) of the Drupal Security Team
Fixed By: 
  • Bálint Kléri (balintbrews)
  • Ignacio Sánchez Holgueras (isholgueras)
  • Drew Webber (mcdruid) of the Drupal Security Team
  • Narendra Singh Rathore (narendrar)
  • Christian López Espínola (penyaskito)
  • Tim Plunkett (tim.plunkett)
Coordinated By: 
  • Greg Knaddison (greggles) of the Drupal Security Team
  • Drew Webber (mcdruid) of the Drupal Security Team
  • Juraj Nemec (poker10) of the Drupal Security Team
  • Jess (xjm) of the Drupal Security Team
Kategorien: Drupal Security

Islandora - Moderately critical - Arbitrary file upload, Cross-site scripting - SA-CONTRIB-2026-016

25 Februar, 2026 - 20:49
Project: Islandora Date: 2026-February-25Security risk: Moderately critical 14 ∕ 25 AC:Basic/A:User/CI:Some/II:Some/E:Theoretical/TD:AllVulnerability: Arbitrary file upload, Cross-site scriptingAffected versions: <2.17.5CVE IDs: CVE-2026-3215Description: 

This module integrates with Islandora, an open-source digital asset management (DAM) framework. Islandora integrates with various open-source services, which can be run in a distributed environment.

The module doesn't sufficiently sanitize URI paths for its custom route used for attaching media to nodes, which can also lead to cross-site scripting and other vulnerabilities.

This vulnerability is mitigated by the fact that an attacker must have a role with the permission "create media" and the ability to edit the node the media is being attached to.

Solution: 

Install the latest version:

  • If you use the Islandora module, upgrade to Islandora 2.17.5.
Reported By: 
  • Drew Webber (mcdruid) of the Drupal Security Team
Fixed By: 
  • Joe Corall (joecorall)
  • Rosie Le Faive (rosiel)
Coordinated By: 
  • Damien McKenna (damienmckenna) of the Drupal Security Team
  • Greg Knaddison (greggles) of the Drupal Security Team
  • Drew Webber (mcdruid) of the Drupal Security Team
  • Juraj Nemec (poker10) of the Drupal Security Team
  • Jess (xjm) of the Drupal Security Team
Kategorien: Drupal Security

CAPTCHA - Moderately critical - Access bypass - SA-CONTRIB-2026-015

25 Februar, 2026 - 20:47
Project: CAPTCHADate: 2026-February-25Security risk: Moderately critical 13 ∕ 25 AC:Basic/A:None/CI:None/II:None/E:Exploit/TD:AllVulnerability: Access bypassAffected versions: <1.17.0 || >=2.0.0 < 2.0.10CVE IDs: CVE-2026-3214Description: 

This module enables you to protect web forms from automated spam by requiring users to pass a challenge.

The module doesn't sufficiently invalidate used security tokens under certain scenarios, which can lead to the CAPTCHA being bypassed on subsequent submissions.

This vulnerability is mitigated by the fact that an attacker must first successfully solve at least one CAPTCHA manually to harvest the valid tokens.

Solution: 

Install the latest version:

  • If you use the Captcha module 2.0.x, upgrade to Captcha 2.0.10.
  • If you use the Captcha module 8.x-1.x, upgrade to Captcha 8.x-1.17.
Reported By: 
  • Andrew Wang (andrew.wang)
  • Andrew Belcher (andrewbelcher)
  • Chris Dudley (dudleyc)
  • M Parker (mparker17)
  • tamasd
  • Tim Wood (timwood)
Fixed By: 
  • Denis K**** (dench0)
  • Joshua Sedler (grevil)
  • Jakob P (japerry)
  • Adam Nagy (joevagyok)
Coordinated By: 
  • cilefen (cilefen) of the Drupal Security Team
  • Damien McKenna (damienmckenna) of the Drupal Security Team
  • Greg Knaddison (greggles) of the Drupal Security Team
  • Lee Rowlands (larowlan) of the Drupal Security Team
  • Michael Hess (mlhess) of the Drupal Security Team
  • Juraj Nemec (poker10) of the Drupal Security Team
  • Jess (xjm) of the Drupal Security Team
Kategorien: Drupal Security

Anti-Spam by CleanTalk - Moderately critical - Cross-site scripting - SA-CONTRIB-2026-014

25 Februar, 2026 - 20:46
Project: Anti-Spam by CleanTalkDate: 2026-February-25Security risk: Moderately critical 13 ∕ 25 AC:Complex/A:None/CI:Some/II:Some/E:Theoretical/TD:UncommonVulnerability: Cross-site scriptingAffected versions: <9.7.0CVE IDs: CVE-2026-3213Description: 

This module enables you to block bots by Firewall.

The module doesn't sufficiently sanitize user input leading to a reflected Cross-site scripting (XSS) vulnerability.

This vulnerability is mitigated by the fact that the vulnerable functionality is only presented to users that are "challenged" or blocked by the firewall.

Solution: 

Install the latest version:

  • If you use the Anti-Spam by CleanTalk module for Drupal, upgrade to Anti-Spam by CleanTalk 9.7.0.
Reported By: 
  • Drew Webber (mcdruid) of the Drupal Security Team
Fixed By: 
  • glomberg
  • Drew Webber (mcdruid) of the Drupal Security Team
  • sergefcleantalk
Coordinated By: 
  • Damien McKenna (damienmckenna) of the Drupal Security Team
  • Greg Knaddison (greggles) of the Drupal Security Team
  • Drew Webber (mcdruid) of the Drupal Security Team
  • Juraj Nemec (poker10) of the Drupal Security Team
  • Jess (xjm) of the Drupal Security Team
Kategorien: Drupal Security
  • 1
  • 2
  • nächste Seite ›
  • letzte Seite »

Benutzeranmeldung

  • Registrieren
  • Neues Passwort anfordern

Aktive Forenthemen

  • Drupal CMS installieren
  • (gelöst)Drupal 11 installieren
  • Titel ausblenden
  • Ich brauche dringen Hilfe zu Updates oder ggf. wwie geht Composer?
  • Dynamische Ansicht von Seiteninhalt (als Tabelle?)
  • Vergabe von Berechtigungen für bestimmte Rollen; mir fehlt der Haken bzw. das „Veröffentlicht“
  • Medien und andere Daten mit Feeds von Drupal 7 auf Drupal 10 migrieren
  • Rolle erstellen nicht zu finden
  • für drupal11 ein Slider Modul
  • [gelöst] W3CSS Paragraphs Views
  • Drupal 11 neu aufsetzen und Bereiche aus 10 importieren
  • Wie erlaubt man neuen Benutzern auf die Resetseite zugreifen zu dürfen.
Weiter

Neue Kommentare

  • Ist grundsätzlichmachbar – aber nichts für „einfach mal schnell“
    vor 17 Stunden 44 Minuten
  • Vielen Dank erst einmal, aber
    vor 2 Tagen 11 Stunden
  • Du hast die "Trusted host
    vor 2 Tagen 19 Stunden
  • Bitte genauer den aktuellen Lösungs-Ansatz beschreiben
    vor 2 Wochen 1 Tag
  • Git und rsync sind die wichtigsten Werkzeuge
    vor 2 Wochen 5 Tagen
  • Arrrrg. Nix Tabelle :-D /*
    vor 7 Wochen 9 Stunden
  • Textboxen mit Tabelle
    vor 7 Wochen 16 Stunden
  • Du sollst ja auch keine
    vor 7 Wochen 16 Stunden
  • Theme
    vor 7 Wochen 16 Stunden
  • Welches Theme benutzt du
    vor 7 Wochen 22 Stunden

Statistik

Beiträge im Forum: 250280
Registrierte User: 20493

Neue User:

  • Robertolix
  • DavidBit
  • JeraldZeF

» Alle User anzeigen

User nach Punkten sortiert:
wla9464
stBorchert6003
quiptime4972
Tobias Bähr4019
bv3924
ronald3857
md3717
Thoor3678
Alexander Langer3416
Exterior2903
» User nach Punkten
Zur Zeit sind 0 User und 7 Gäste online.

Drupal Security

  • Obfuscate - Moderately critical - Cross-site scripting - SA-CONTRIB-2026-033
  • Drupal core - Moderately critical - Cross-site scripting - SA-CORE-2026-003
  • Drupal core - Moderately critical - Gadget Chain - SA-CORE-2026-002
  • Drupal core - Critical - Cross-site scripting - SA-CORE-2026-001
  • Orejime - Moderately critical - Cross-site scripting - SA-CONTRIB-2026-032
Weiter

Hauptmenü

  • » Home
  • » Handbuch & FAQ
  • » Forum
  • » Übersetzungsserver
  • » Suche

Quicklinks I

  • Infos
  • Drupal Showcase
  • Installation
  • Update
  • Forum
  • Team
  • Verhaltensregeln

Quicklinks II

  • Drupal Jobs
  • FAQ
  • Drupal-Kochbuch
  • Best Practice - Drupal Sites - Guidelines
  • Drupal How To's

Quicklinks III

  • Tipps & Tricks
  • Drupal Theme System
  • Theme Handbuch
  • Leitfaden zur Entwicklung von Modulen

RSS & Twitter

  • Drupal Planet deutsch
  • RSS Feed News
  • RSS Feed Planet
  • Twitter Drupalcenter
Drupalcenter Team | Impressum & Datenschutz | Kontakt
Angetrieben von Drupal | Drupal is a registered trademark of Dries Buytaert.
Drupal Initiative - Drupal Association