Drupal Canvas - Moderately critical - Access bypass - SA-CONTRIB-2026-006

Date: 
2026-January-28
CVE IDs: 
CVE-2026-1553

This Drupal Canvas module is a new visual page builder for Drupal. You can create reusable components that match your design system, drag them onto a page, edit content in place, preview changes across multiple pages, and undo mistakes with ease.

The module doesn't sufficiently validate access to Canvas Pages when they are unpublished.

This vulnerability is mitigated by the fact that Canvas Pages don't have content moderation enabled by default, and they must be unpublished after being released, and archiving is not a feature provided by the module yet.

Microsoft Entra ID SSO Login - Critical - Access bypass - SA-CONTRIB-2026-005

Date: 
2026-January-14
CVE IDs: 
CVE-2026-0948

This module enables Drupal sites to authenticate users via Microsoft Entra ID (formerly Azure AD) using OAuth 2.0.

The module doesn't sufficiently validate API responses from Microsoft allowing complete account takeover of any user, including site administrators, without requiring any credentials or access to the target's email account.

AT Internet Piano Analytics - Moderately critical - Cross-site Scripting - SA-CONTRIB-2026-004

Date: 
2026-January-14
CVE IDs: 
CVE-2026-0947

This module integrates the AT Internet Piano Analytics service.

The module does not filter administrator-entered text leading to a persistent Cross-site Scripting (XSS) vulnerability.

This vulnerability is mitigated by the fact that an attacker must have a role with the permission "administer pianoanalytics".

AT Internet SmartTag - Moderately critical - Cross-site Scripting - SA-CONTRIB-2026-003

Date: 
2026-January-14
CVE IDs: 
CVE-2026-0946

This module integrates the AT Internet SmartTag service.

The module does not filter administrator-entered text leading to a persistent Cross-site Scripting (XSS) vulnerability.

This vulnerability is mitigated by the fact that an attacker must have a role with the permission "administer atsmarttag".

Role Delegation - Moderately critical - Access bypass - SA-CONTRIB-2026-002

Date: 
2026-January-14
CVE IDs: 
CVE-2026-0945

This module allows site administrators to grant specific roles the authority to assign selected roles to users, without them needing the "administer permissions" permission.

The module contains an access bypass vulnerability when used in combination with the Views Bulk Operations module. A user with the ability to delegate a role is also able to assign the administrator role, including to their own user.

This vulnerability is mitigated by the fact that an attacker must have access to a view of users with the Views Bulk Operations module enabled.

Group invite - Moderately critical - Access bypass - SA-CONTRIB-2026-001

Date: 
2026-January-14
CVE IDs: 
CVE-2026-0944

This module enables allows group managers to invite people into their group.

The module doesn't sufficiently check access under certain circumstances, allowing unauthorized users to access the group's content.

This vulnerability is mitigated by the fact that it only occurs when certain uncommon actions are taken by a user with the permission to create group invites.

HTTP Client Manager - Less critical - Information disclosure - SA-CONTRIB-2025-126

Date: 
2025-December-17
CVE IDs: 
CVE-2025-14840

Http Client Manager introduces a new Guzzle based plugin which allows you to manage HTTP clients using Guzzle Service Descriptions via YAML, JSON or PHP files, in a simple and efficient way. The modules allows administrators to configure HTTP requests as part of Event Condition Action (ECA) automation.

The module does not sufficiently maintain separation of data from request operations, potentially leading to information disclosure in very uncommon situations.

Acquia Content Hub - Moderately critical - Cross-Site Request Forgery - SA-CONTRIB-2025-125

Date: 
2025-December-10
CVE IDs: 
CVE-2025-14472

This module provides a centralized content distribution and syndication solution so thta customers can publish, reuse, and syndicate content across a network of Drupal websites.

The module doesn't sufficiently protect export routes from cross-site request forgery (CSRF) attacks, potentially allowing an attacker to trick an admin into exporting an unwanted entity.

Disable Login Page - Critical - Access bypass - SA-CONTRIB-2025-124

Date: 
2025-December-03
CVE IDs: 
CVE-2025-13986

This module enables you to disable the standard Drupal login form (/user/login) so site owners can prevent interactive logins via the UI.

The module does not sufficiently block authentication when the REST/HTTP login route is used. An attacker (or legitimate user) with valid credentials can authenticate using the REST login endpoint (/user/login?_format=json) or other HTTP-based authentication routes, effectively bypassing the module’s protection of the UI login page.

Entity Share - Moderately critical - Access bypass, Information Disclosure - SA-CONTRIB-2025-123

Date: 
2025-December-03
CVE IDs: 
CVE-2025-13985

This module enables you to deploy content from one Drupal website to another.

The module provides some default configuration without sufficient access control.

This vulnerability is mitigated by the fact that an administrator can add some default access control permission.

Pages

Subscribe with RSS Subscribe to Security advisories