Drupal core - Moderately critical - Cross-site scripting - SA-CORE-2026-003

Date: 
2026-April-15
CVE IDs: 
CVE-2026-6367

Drupal 11.3 comes with support for completing entity suggestions whilst adding a link to CKEditor 5.

The suggestions aren't sufficiently sanitized and a malicious user could trigger a stored cross site scripting attack against another user.

Drupal core - Moderately critical - Gadget Chain - SA-CORE-2026-002

Date: 
2026-April-15
CVE IDs: 
CVE-2026-6366

Drupal core contains a chain of methods that could be exploitable when an insecure deserialization vulnerability exists on the site. This so-called "gadget chain" presents no direct threat, but is a vector that can be used to achieve remote code execution or SQL injection if the application deserializes untrusted data due to another vulnerability.

This issue is not directly exploitable.

Drupal core - Critical - Cross-site scripting - SA-CORE-2026-001

Date: 
2026-April-15
CVE IDs: 
CVE-2026-6365

Drupal core's jQuery integration for AJAX modal dialog boxes does not sufficiently sanitize certain options, which which can lead to a cross-site scripting (XSS) vulnerability.

Orejime - Moderately critical - Cross-site scripting - SA-CONTRIB-2026-032

Date: 
2026-April-08
CVE IDs: 
CVE-2026-6095

The IframeConsent element writes HTML attributes without escaping their value.

This module has a XSS vulnerability. If an attacker is able to write an <iframe-consent> tag, they may be able to insert arbitrary JavaScript.

SAML SSO - Service Provider - Critical - Authentication bypass - SA-CONTRIB-2026-031

Date: 
2026-April-01
CVE IDs: 
CVE-2026-5343

This module enables you to perform SAML-protocol-based single-sign-on (SSO) on a Drupal site.

The module doesn't sufficiently block access, leading to a authentication bypass vulnerability.

Automated Logout - Moderately critical - Cross-site request forgery - SA-CONTRIB-2026-030

Date: 
2026-March-18
CVE IDs: 
CVE-2026-4393

This module provides a site administrator the ability to log users out after a specified time of inactivity.

The module doesn't sufficiently protect its routes from cross-site request forgery (CSRF), allowing the logout route to be triggered without user interaction.

Unpublished Node Permissions - Critical - Access bypass - SA-CONTRIB-2026-029

Date: 
2026-March-11
CVE IDs: 
CVE-2026-4933

This module creates permissions per node content type to control access to unpublished nodes per content type.

The module does not consistently control access for unpublished translated nodes.

AI (Artificial Intelligence) - Moderately critical - Information Disclosure - SA-CONTRIB-2026-028

Date: 
2026-March-11
CVE IDs: 
CVE-2026-3573

The module and certain submodules (AI Automators, AI Translate, AI API Explorer, AI Content Suggestions) provide the ability to use an LLM to generate HTML or Markdown and preview it in a browser.

Under certain circumstances, rendering of this HTML can lead to exposing secret communications in the context of the LLM request.

OpenID Connect / OAuth client - Less critical - Access bypass - SA-CONTRIB-2026-027

Date: 
2026-March-04
CVE IDs: 
CVE-2026-3532

This module enables you to use an external OpenID Connect login provider to authenticate and log in users on your site. If a user signs in with a login provider for the first time on the website, a new Drupal user will be created.

The module doesn't sufficiently validate the uniqueness of certain user fields depending on the database engine and its collation.

As a result, a user may be able to register with the same email address as another user.

This may lead to data integrity issues.

OpenID Connect / OAuth client - Moderately critical - Access bypass - SA-CONTRIB-2026-026

Date: 
2026-March-04
CVE IDs: 
CVE-2026-3531

This module enables you to use an external OpenID Connect login provider to authenticate and log in users on your site. If a user signs in with a login provider for the first time on the website, a new Drupal user will be created.

A visitor who successfully logs in to their Identity Provider and is denied access to Drupal through custom code or a server error will maintain their session at the Identity Provider, possibly leading to access bypass situations, especially in a shared computing environment.

Pages

Subscribe with RSS Subscribe to Security advisories