Startseite
  • » Home
  • » Handbuch & FAQ
  • » Forum
  • » Übersetzungsserver
  • » Suche
Startseite › Newsfeed-Generator › Herkunft ›

Drupal Core Security

Inhalt abgleichen
URL: https://www.drupal.org/security/core
Aktualisiert: vor 1 Stunde 37 Minuten

Drupal core - Moderately critical - Cross-site scripting - SA-CORE-2026-003

15 April, 2026 - 21:27
Project: Drupal coreDate: 2026-April-15Security risk: Moderately critical 13 ∕ 25 AC:Basic/A:User/CI:Some/II:Some/E:Theoretical/TD:DefaultVulnerability: Cross-site scriptingAffected versions: >= 11.3.0 < 11.3.7CVE IDs: CVE-2026-6367Description: 

Drupal 11.3 comes with support for completing entity suggestions whilst adding a link to CKEditor 5.

The suggestions aren't sufficiently sanitized and a malicious user could trigger a stored cross site scripting attack against another user.

Solution: 

Install the latest version:

  • If you use Drupal 11.3.x, update to Drupal 11.3.7
  • Drupal versions below 11.3 are not affected by this vulnerability
Reported By: 
  • cantina_security
  • Dries Buytaert (dries)
  • Shirsendu Mondal
Fixed By: 
  • Lee Rowlands (larowlan) of the Drupal Security Team
  • Drew Webber (mcdruid) of the Drupal Security Team
  • Mingsong (mingsong), provisional member of the Drupal Security Team
Coordinated By: 
  • Damien McKenna (damienmckenna) of the Drupal Security Team
  • Greg Knaddison (greggles) of the Drupal Security Team
  • Lee Rowlands (larowlan) of the Drupal Security Team
  • Juraj Nemec (poker10) of the Drupal Security Team
  • Jess (xjm) of the Drupal Security Team
Kategorien: Drupal Security

Drupal core - Moderately critical - Gadget Chain - SA-CORE-2026-002

15 April, 2026 - 21:25
Project: Drupal coreDate: 2026-April-15Security risk: Moderately critical 14 ∕ 25 AC:Complex/A:Admin/CI:All/II:All/E:Theoretical/TD:UncommonVulnerability: Gadget ChainAffected versions: >= 8.0.0 < 10.5.9 || >= 10.6.0 < 10.6.7 || >= 11.0.0 < 11.2.11 || >= 11.3.0 < 11.3.7CVE IDs: CVE-2026-6366Description: 

Drupal core contains a chain of methods that could be exploitable when an insecure deserialization vulnerability exists on the site. This so-called "gadget chain" presents no direct threat, but is a vector that can be used to achieve remote code execution or SQL injection if the application deserializes untrusted data due to another vulnerability.

This issue is not directly exploitable.

This issue is mitigated by the fact that in order for it to be exploitable, a separate vulnerability must be present to allow an attacker to pass unsafe input to unserialize(). There are no such known exploits in Drupal core.

Solution: 

Install the latest version:

  • If you use Drupal 10.5.x, update to Drupal 10.5.9.
  • If you use Drupal 10.6.x, update to Drupal 10.6.7.
  • If you use Drupal 11.2.x, update to Drupal 11.2.11.
  • If you use Drupal 11.3.x, update to Drupal 11.3.7.

Drupal 11.1.x, Drupal 11.0.x, Drupal 10.4.x, and below are end-of-life and do not receive security coverage. (Drupal 8 and Drupal 9 have both reached end-of-life.)

Reported By: 
  • Truong Le (hswww)
  • menon
  • t-chen
Fixed By: 
  • Benji Fisher (benjifisher) of the Drupal Security Team
  • cilefen (cilefen) of the Drupal Security Team
  • Neil Drumm (drumm) of the Drupal Security Team
  • Greg Knaddison (greggles) of the Drupal Security Team
  • Lee Rowlands (larowlan) of the Drupal Security Team
  • Dave Long (longwave) of the Drupal Security Team
  • Drew Webber (mcdruid) of the Drupal Security Team
  • Ra Mänd (ram4nd), provisional member of the Drupal Security Team
  • Jess (xjm) of the Drupal Security Team
Coordinated By: 
  • Greg Knaddison (greggles) of the Drupal Security Team
  • Lee Rowlands (larowlan) of the Drupal Security Team
  • Dave Long (longwave) of the Drupal Security Team
  • Drew Webber (mcdruid) of the Drupal Security Team
  • Juraj Nemec (poker10) of the Drupal Security Team
  • Jess (xjm) of the Drupal Security Team
Kategorien: Drupal Security

Drupal core - Critical - Cross-site scripting - SA-CORE-2026-001

15 April, 2026 - 21:24
Project: Drupal coreDate: 2026-April-15Security risk: Critical 15 ∕ 25 AC:Complex/A:None/CI:Some/II:Some/E:Theoretical/TD:AllVulnerability: Cross-site scriptingAffected versions: >= 8.0.0 < 10.5.9 || >= 10.6.0 < 10.6.7 || >= 11.0.0 < 11.2.11 || >= 11.3.0 < 11.3.7CVE IDs: CVE-2026-6365Description: 

Drupal core's jQuery integration for AJAX modal dialog boxes does not sufficiently sanitize certain options, which which can lead to a cross-site scripting (XSS) vulnerability.

Solution: 

Install the latest version:

  • If you use Drupal 10.5.x, update to Drupal 10.5.9.
  • If you use Drupal 10.6.x, update to Drupal 10.6.7.
  • If you use Drupal 11.2.x, update to Drupal 11.2.11.
  • If you use Drupal 11.3.x, update to Drupal 11.3.7.

Drupal 11.1.x, Drupal 11.0.x, Drupal 10.4.x, and below are end-of-life and do not receive security coverage. (Drupal 8 and Drupal 9 have both reached end-of-life.)

Reported By: 
  • Murat Kekiç (murat_kekic)
Fixed By: 
  • Anna Kalata (akalata) of the Drupal Security Team
  • Benji Fisher (benjifisher) of the Drupal Security Team
  • Neil Drumm (drumm) of the Drupal Security Team
  • Lee Rowlands (larowlan) of the Drupal Security Team
  • Michael Hess (mlhess) of the Drupal Security Team
  • James Gilliland (neclimdul) of the Drupal Security Team
  • Joseph Zhao (pandaski) of the Drupal Security Team
  • Juraj Nemec (poker10) of the Drupal Security Team
  • Ra Mänd (ram4nd), provisional member of the Drupal Security Team
  • Jess (xjm) of the Drupal Security Team
Coordinated By: 
  • Greg Knaddison (greggles) of the Drupal Security Team
  • Lee Rowlands (larowlan) of the Drupal Security Team
  • Pierre Rudloff (prudloff) of the Drupal Security Team
  • Jess (xjm) of the Drupal Security Team
Kategorien: Drupal Security

Benutzeranmeldung

  • Registrieren
  • Neues Passwort anfordern

Aktive Forenthemen

  • Drupal CMS installieren
  • (gelöst)Drupal 11 installieren
  • Titel ausblenden
  • Ich brauche dringen Hilfe zu Updates oder ggf. wwie geht Composer?
  • Dynamische Ansicht von Seiteninhalt (als Tabelle?)
  • Vergabe von Berechtigungen für bestimmte Rollen; mir fehlt der Haken bzw. das „Veröffentlicht“
  • Medien und andere Daten mit Feeds von Drupal 7 auf Drupal 10 migrieren
  • Rolle erstellen nicht zu finden
  • für drupal11 ein Slider Modul
  • [gelöst] W3CSS Paragraphs Views
  • Drupal 11 neu aufsetzen und Bereiche aus 10 importieren
  • Wie erlaubt man neuen Benutzern auf die Resetseite zugreifen zu dürfen.
Weiter

Neue Kommentare

  • Ich habe ja keine Angst vor
    vor 17 Stunden 3 Minuten
  • Ist grundsätzlichmachbar – aber nichts für „einfach mal schnell“
    vor 2 Tagen 23 Stunden
  • Vielen Dank erst einmal, aber
    vor 4 Tagen 16 Stunden
  • Du hast die "Trusted host
    vor 5 Tagen 59 Minuten
  • Bitte genauer den aktuellen Lösungs-Ansatz beschreiben
    vor 2 Wochen 3 Tagen
  • Git und rsync sind die wichtigsten Werkzeuge
    vor 3 Wochen 11 Stunden
  • Arrrrg. Nix Tabelle :-D /*
    vor 7 Wochen 2 Tagen
  • Textboxen mit Tabelle
    vor 7 Wochen 2 Tagen
  • Du sollst ja auch keine
    vor 7 Wochen 2 Tagen
  • Theme
    vor 7 Wochen 2 Tagen

Statistik

Beiträge im Forum: 250281
Registrierte User: 20494

Neue User:

  • Robertolix
  • DavidBit
  • JeraldZeF

» Alle User anzeigen

User nach Punkten sortiert:
wla9464
stBorchert6003
quiptime4972
Tobias Bähr4019
bv3924
ronald3857
md3717
Thoor3678
Alexander Langer3416
Exterior2903
» User nach Punkten
Zur Zeit sind 0 User und 27 Gäste online.

Drupal Security

  • Obfuscate - Moderately critical - Cross-site scripting - SA-CONTRIB-2026-033
  • Drupal core - Moderately critical - Cross-site scripting - SA-CORE-2026-003
  • Drupal core - Moderately critical - Gadget Chain - SA-CORE-2026-002
  • Drupal core - Critical - Cross-site scripting - SA-CORE-2026-001
  • Orejime - Moderately critical - Cross-site scripting - SA-CONTRIB-2026-032
Weiter

Hauptmenü

  • » Home
  • » Handbuch & FAQ
  • » Forum
  • » Übersetzungsserver
  • » Suche

Quicklinks I

  • Infos
  • Drupal Showcase
  • Installation
  • Update
  • Forum
  • Team
  • Verhaltensregeln

Quicklinks II

  • Drupal Jobs
  • FAQ
  • Drupal-Kochbuch
  • Best Practice - Drupal Sites - Guidelines
  • Drupal How To's

Quicklinks III

  • Tipps & Tricks
  • Drupal Theme System
  • Theme Handbuch
  • Leitfaden zur Entwicklung von Modulen

RSS & Twitter

  • Drupal Planet deutsch
  • RSS Feed News
  • RSS Feed Planet
  • Twitter Drupalcenter
Drupalcenter Team | Impressum & Datenschutz | Kontakt
Angetrieben von Drupal | Drupal is a registered trademark of Dries Buytaert.
Drupal Initiative - Drupal Association