Updates released on Wednesday for the Drupal content management system (CMS) patch a remote code execution vulnerability related to failure to properly sanitize the names of uploaded files.
The vulnerability, tracked as CVE-2020-13671, has been classified as critical, but it’s worth mentioning that Drupal uses the NIST Common Misuse Scoring System, which assigns vulnerabilities a score ranging between 0 and 25, with “critical” being only the second highest rating, after “highly critical.”
An attacker who can upload files to a server can use certain types of extensions to bypass restrictions and get malicious code executed.
“Drupal core does not properly sanitize certain filenames on uploaded files, which can lead to files being interpreted as the incorrect extension and served as the wrong MIME type or executed as PHP for certain hosting configurations,” Drupal explained in an advisory.
The issue was reported to Drupal developers by several people, and it has been patched in Drupal 7, 8 and 9 with the release of versions 7.74, 8.8.11, 8.9.9 and 9.0.8.
Drupal has also advised users to check their servers for files with potentially malicious extensions, such as filename.php.txt or filename.html.gif. Users should be on the lookout for files that have extensions such as phar, php, pl, py, cgi, html, htm, phtml, js, and asp.
This is the fifth round of security updates released this year by Drupal developers. In March they updated the CKEditor to patch XSS vulnerabilities, in May they addressed XSS and open redirect flaws, in June they fixed code execution and several other types of issues, and in September they patched XSS and information disclosure vulnerabilities.
Related: XSS, Open Redirect Vulnerabilities Patched in Drupal
Related: Drupal Patches Code Execution Flaw Most Likely to Impact Windows Servers
Related: Critical Drupal Vulnerability Allows Remote Code Execution

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Industry Reactions to Hive Ransomware Takedown: Feedback Friday
- US Reiterates $10 Million Reward Offer After Disruption of Hive Ransomware
- Hive Ransomware Operation Shut Down by Law Enforcement
- UK Gov Warns of Phishing Attacks Launched by Iranian, Russian Cyberspies
- Dozens of Cybersecurity Companies Announced Layoffs in Past Year
- Security Update for Chrome 109 Patches 6 Vulnerabilities
- New Open Source OT Security Tool Helps Address Impact of Upcoming Microsoft Patch
- Forward Networks Raises $50 Million in Series D Funding
Latest News
- Critical Vulnerability Impacts Over 120 Lexmark Printers
- BIND Updates Patch High-Severity, Remotely Exploitable DoS Flaws
- Industry Reactions to Hive Ransomware Takedown: Feedback Friday
- Microsoft Urges Customers to Patch Exchange Servers
- Iranian APT Leaks Data From Saudi Arabia Government Under New Persona
- US Reiterates $10 Million Reward Offer After Disruption of Hive Ransomware
- Cyberattacks Target Websites of German Airports, Admin
- US Infiltrates Big Ransomware Gang: ‘We Hacked the Hackers’
