Drupal core - Moderately critical - Defacement - SA-CORE-2025-007

Date: 
2025-November-12
CVE IDs: 
CVE-2025-13082

By generating and tricking a user into visiting a malicious URL, an attacker can perform site defacement.

The defacement is not stored and is only present when the URL has been crafted for that purpose. Only the defacement is present, so no other site content (such as branding) is rendered.

Drupal core - Moderately critical - Gadget chain - SA-CORE-2025-006

Date: 
2025-November-12
CVE IDs: 
CVE-2025-13081

Drupal core contains a chain of methods that is exploitable when an insecure deserialization vulnerability exists on the site. This so-called "gadget chain" presents no direct threat, but is a vector that can be used to achieve remote code execution if the application deserializes untrusted data due to another vulnerability.

It is not directly exploitable.

Drupal core - Moderately critical - Denial of Service - SA-CORE-2025-005

Date: 
2025-November-12
CVE IDs: 
CVE-2025-13080

Drupal Core has a rarely used feature, provided by an underlying library, which allows certain attributes of incoming HTTP requests to be overridden.

This functionality can be abused in a way that may cause Drupal to cache response data that it should not. This can lead to legitimate requests receiving inappropriate cached responses (cache poisoning).

This could be exploited in various ways:

Simple multi step form - Moderately critical - Cross-site Scripting - SA-CONTRIB-2025-116

Date: 
2025-November-05
CVE IDs: 
CVE-2025-12761

This module provides the ability to convert any entity form into a simple multi-step form.

The module doesn’t sufficiently filter certain user-provided text leading to a cross-site scripting (XSS) vulnerability.

This vulnerability is mitigated by the fact that an attacker must have a role with the permission “administer node form display”.

Email TFA - Moderately critical - Access bypass - SA-CONTRIB-2025-115

Date: 
2025-November-05
CVE IDs: 
CVE-2025-12760

The Email TFA module provides additional email-based two-factor authentication for Drupal logins.

In certain scenarios, the module does not fully protect all login mechanisms as expected.

This issue is mitigated by the fact that an attacker must already have valid user credentials (username and password) to take advantage of the weakness.

Normal Drupal core security window rescheduled for November 12, 2025 due to DrupalCon - PSA-2025-11-03

Date: 
2025-November-03

The upcoming Drupal core security release window has been rescheduled from November 19, 2025 to November 12, 2025. As normal, the window will occur between 1600 UTC and 2200 UTC.

Simple OAuth (OAuth2) & OpenID Connect - Critical - Access bypass - SA-CONTRIB-2025-114

Date: 
2025-October-29
CVE IDs: 
CVE-2025-12466

This module introduces an OAuth 2.0 authorization server, which can be configured to protect your Drupal instance with access tokens, or allow clients to request new access tokens and refresh them.

The module doesn't sufficiently respect granted scopes, it affects all access checks that are based on roles. For example: routes that have the _role requirement, can be bypassed with an access token.

CivicTheme Design System - Moderately critical - Cross-site Scripting - SA-CONTRIB-2025-113

Date: 
2025-October-22
CVE IDs: 
CVE-2025-12083

CivicTheme is a design system and theme framework used to build content-rich Drupal websites. It includes editorial workflows, structured content types, and flexible theming components.

CivicTheme does not sufficiently filter field data before rendering them in Twig templates. This combined with multiple instances of the Twig raw filter throughout CivicTheme components, allows for the injection of malicious scripts in browser contexts.

CivicTheme Design System - Moderately critical - Information disclosure - SA-CONTRIB-2025-112

Date: 
2025-October-22
CVE IDs: 
CVE-2025-12082

CivicTheme is a design system and theme framework used to build content-rich Drupal websites. It includes editorial workflows, structured content types, and flexible theming components.

The theme doesn't sufficiently check access to entities when they are displayed as reference cards used in manual lists, which leads to an information disclosure vulnerability

Reverse Proxy Header - Less critical - Access bypass - SA-CONTRIB-2025-111

Date: 
2025-September-24
CVE IDs: 
CVE-2025-10929

This module allows you to specify an HTTP header name to determine the client's IP address.

The module doesn't sufficiently handle all cases under the scenario if Drupal Core settings $settings['reverse_proxy'] is set to TRUE and $settings['reverse_proxy_addresses'] is configured.

This vulnerability allows an attacker to spoof a request IP address (as Drupal sees it), potentially bypassing a variety of controls.

Pages

Subscribe with RSS Subscribe to Security advisories