Show advisories for only Drupal core, only PSAs, or all security advisories

Security advisories for third-party projects that are not part of Drupal core - this includes all modules, themes, and installation profiles that have been contributed by community members.

Protected Pages - Critical - Access bypass - SA-CONTRIB-2023-013

Date: 
2023-April-12

This module enables you to secure any page with a password.

The module does not sufficiently restrict access to the page content.

Xray Audit - Moderately critical - Cross site scripting - SA-CONTRIB-2023-012

Date: 
2023-March-29

This module is a tool for developers, analysts, and administrators that allows them to generate reports on a given Drupal installation.

The module does not sufficiently sanitize some data presented in its reports.

This vulnerability is mitigated by the fact that an attacker must have a role with permissions to administer an impacted content type.

Responsive media Image Formatter - Critical - Unsupported - SA-CONTRIB-2023-011

Date: 
2023-March-15

The security team is marking this project unsupported. There is a known security issue with the project that has not been fixed by the maintainer. If you would like to maintain this project, please read: https://www.drupal.org/node/251466#procedure---own-project---unsupported

Media Responsive Thumbnail - Moderately critical - Information disclosure - SA-CONTRIB-2023-010

Date: 
2023-March-15

The Media Responsive Thumbnail module allows media reference fields to be rendered as a responsive image.

This module does not properly check entity access prior to rendering media. This may result in users seeing thumbnails of media items they do not have access to.

This release was coordinated with SA-CORE-2023-002.

Gutenberg - Less critical - Denial of Service - SA-CONTRIB-2023-009

Date: 
2023-March-08

This module provides a new UI experience for node editing - Gutenberg editor.

This vulnerability can cause DoS by using reusable blocks improperly.

This vulnerability is mitigated by the fact an attacker must have "use gutenberg" permission to exploit it.

Group control for forums - Critical - Access bypass - SA-CONTRIB-2023-008

Date: 
2023-March-01

This module enables you to associate Forums as Group 1.x content and use Group access permissions.

Previous versions of the module incorrectly set node access on creation, and did not correctly restrict access to lists of forum topics.

Thunder - Moderately critical - Access bypass - SA-CONTRIB-2023-007

Date: 
2023-March-01

Thunder is a Drupal distribution for professional publishing. The thunder distribution ships the thunder_gqls module which provides a graphql interface.

The module doesn't sufficiently check access when serving user data via graphql leading to an access bypass vulnerability potentially exposing email addresses.

Better Social Sharing Buttons - Less critical - Cross Site Scripting - SA-CONTRIB-2023-006

Date: 
2023-March-01

This module enables you to add social sharing buttons to a site.

The module doesn't sufficiently sanitize the weight and ratio values entered in the module or block configuration.

This vulnerability is mitigated by the fact that an attacker must have a role with the permission "administer blocks".

Apigee Edge - Moderately critical - Access bypass - SA-CONTRIB-2023-005

Date: 
2023-February-01

The Apigee Edge module allows connecting a Drupal site to Apigee X / Edge in order to build a developer portal.

Previous module versions did not support entity query level access checking, which could have led to information disclosure or access bypass in various places.

Media Library Form API Element - Moderately critical - Information Disclosure - SA-CONTRIB-2023-004

Date: 
2023-January-18

This module enables you to use the media library in custom forms without the Media Library Widget.

The module does not properly check entity access in some circumstances. This may result in users with access to edit content seeing metadata about media items they are not authorized to access.

The vulnerability is mitigated by the fact that the inaccessible media will only be visible to users who can already edit content that includes a media reference field.

Pages

Subscribe with RSS Subscribe to Security advisories for contributed projects