Security updates released on Wednesday for Drupal 7 and Drupal 8 patch a couple of access bypass and privilege escalation vulnerabilities.
According to a security advisory published by Drupal developers, version 7 is affected by a moderately critical flaw in the User module. The vulnerability allows a registered user to obtain all roles on a website by leveraging contributed or custom code that triggers a rebuild of the user profile form. An attacker could exploit this weakness to obtain administrative access to the targeted website.
“This issue is mitigated by the fact that it requires contributed or custom code that performs a form rebuild during submission of the user profile form,” Drupal noted.
The issue, reported by an individual who uses the online moniker “alfaguru,” has been addressed with the release of Drupal 7.44.
Drupal developer Nickolay Leshchev discovered that the “Views” module used in versions 7 and 8 is affected by a “less critical” access bypass vulnerability. The Views module allows website administrators and designers to create, manage and display lists of content.
The flaw allows users that don’t have the “View content count” permission to see information from the Statistics module. This security bug can only be exploited if the view is configured to show a “Content statistics” field (e.g. Total Views, Views Today, Last Visit).
Drupal 8 users can resolve the issue by updating to Drupal 8.1.3. In Drupal 7, users need to update the Views module to version 7.x-3.14.
Drupal 8 was made generally available in mid-November 2015. A few months before the official launch, the developers of the popular CMS invited hackers to find vulnerabilities in the new version and promised them bounties ranging between $50 and $1,000.
Vulnerabilities in Drupal can be highly valuable for malicious actors. Researchers reported last month that attackers had still been exploiting CVE-2014-3704 to hack websites more than 19 months after it was patched.
Related: Critical Drupal Updates Patch Several Vulnerabilities

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Meta Awards $27,000 Bounty for 2FA Bypass Vulnerability
- Industry Reactions to Hive Ransomware Takedown: Feedback Friday
- US Reiterates $10 Million Reward Offer After Disruption of Hive Ransomware
- Hive Ransomware Operation Shut Down by Law Enforcement
- UK Gov Warns of Phishing Attacks Launched by Iranian, Russian Cyberspies
- Dozens of Cybersecurity Companies Announced Layoffs in Past Year
- Security Update for Chrome 109 Patches 6 Vulnerabilities
- New Open Source OT Security Tool Helps Address Impact of Upcoming Microsoft Patch
Latest News
- Russia-Linked APT29 Uses New Malware in Embassy Attacks
- Meta Awards $27,000 Bounty for 2FA Bypass Vulnerability
- The Effect of Cybersecurity Layoffs on Cybersecurity Recruitment
- Critical Vulnerability Impacts Over 120 Lexmark Printers
- BIND Updates Patch High-Severity, Remotely Exploitable DoS Flaws
- Industry Reactions to Hive Ransomware Takedown: Feedback Friday
- Microsoft Urges Customers to Patch Exchange Servers
- Iranian APT Leaks Data From Saudi Arabia Government Under New Persona
