Security Experts:

Connect with us

Hi, what are you looking for?


Application Security

Drupal Patches Vulnerabilities Leading to Information Disclosure

Drupal released updates that resolve four vulnerabilities in Drupal core and three plugins.

Drupal this week announced software updates that resolve a total of four vulnerabilities in Drupal core and three plugins, and which could lead to unauthorized access to data.

The Drupal core issue exists because the Media Library module does not perform proper checks on entity access in some cases, which could allow users who can edit content to view metadata about media items that they should not have access to.

An identical issue impacts the Media Library Form API Element plugin, which supports the use of the media library in custom forms, without having to use the Media Library Widget.

According to Drupal, both vulnerabilities are “mitigated by the fact that the inaccessible media will only be visible to users who can already edit content that includes a media reference field”.

The third flaw, which was patched in the Media Library Block plugin, which supports the rendering of media entities in a block, has a similar root cause: improper check of media access in some circumstances.

The vulnerability could allow users to see media items without authorization, provided that a block containing restricted media is placed on a page. To mitigate the bug, administrators can remove blocks referencing media items with access restrictions.

The fourth vulnerability was identified in the Entity Browser plugin, which enables users to “select entities from entity reference fields using a custom browser widget”.

Lack of proper entity access checks in some cases could allow users who have access to edit content to view entity metadata without authorization. Only users who can edit content using Entity Browser would be able to view the metadata.

The issues were resolved with the release of Drupal versions 10.0.2, 9.5.2, and 9.4.10, Media Library Form API Element version 2.0.6, Media Library Block version 1.0.4, and Entity Browser version 8.x-2.9.

Drupal assessed these vulnerabilities with a severity rating of ‘moderately critical’, which is roughly the equivalent of ‘medium severity’. More information on the resolved issues can be found on Drupal’s product security page.

Related: Drupal Updates Patch Vulnerability in Twig Template Engine

Related: Code Execution and Other Vulnerabilities Patched in Drupal

Related: Drupal Patches ‘High-Risk’ Third-Party Library Flaws

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Mobile & Wireless

Technical details published for an Arm Mali GPU flaw leading to arbitrary kernel code execution and root on Pixel 6.

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

Mobile & Wireless

Apple’s iOS 12.5.7 update patches CVE-2022-42856, an actively exploited vulnerability, in old iPhones and iPads.


Security researchers have observed an uptick in attacks targeting CVE-2021-35394, an RCE vulnerability in Realtek Jungle SDK.

Mobile & Wireless

Two vulnerabilities in Samsung’s Galaxy Store that could be exploited to install applications or execute JavaScript code by launching a web page.


Several vulnerabilities have been patched in OpenText’s enterprise content management (ECM) product.