Security Experts:

Connect with us

Hi, what are you looking for?



Restriction Bypass, XSS Flaws Patched in Drupal 8

The developers of the Drupal content management system (CMS) announced on Wednesday the availability of versions 8.1.10 and 8.2.0-rc2, which address three potentially serious vulnerabilities.

The developers of the Drupal content management system (CMS) announced on Wednesday the availability of versions 8.1.10 and 8.2.0-rc2, which address three potentially serious vulnerabilities.

Drupal versions 8.x are affected by two restriction bypass issues and one cross-site scripting (XSS) vulnerability. The XSS flaw, rated “critical,” allows an attacker to execute arbitrary code in the victim’s browser if they can get the targeted user to access a specially crafted URL. The problem is caused by lack of proper sanitization in HTTP exceptions.

Another vulnerability, also rated “critical,” is related to the feature that allows Drupal users to export their site’s configuration to a file. The feature should normally be limited to users who have the right permissions, but a flaw makes it possible to download full configuration exports even without administrative privileges.

A less critical restriction bypass issue is related to the visibility of comments. Experts discovered that a user who has rights to edit a node can set the visibility on comments for that node, despite the fact that this operation should be restricted to users who have “administer comments” permissions.

Quintus Maximus, Kier Heyl, Anton Shubkin and Ivan have been credited for reporting these issues to Drupal developers. CVE identifiers have yet to be assigned to the vulnerabilities.

It’s important for website administrators to quickly apply Drupal security updates as many of the vulnerabilities affecting the CMS are being exploited in the wild in an effort to hack websites.

Sucuri reported this summer that a flaw patched nearly two years ago, dubbed “Drupalgeddon,” had still been successfully exploited to compromise websites.

Earlier this month, the SANS Institute’s Internet Storm Center warned that a Drupal module bug addressed two months ago had been exploited in the wild. The organization’s honeypots detected 44 exploitation attempts coming from 16 unique IP addresses in a single day.

Related Reading: Drupal Patches Critical Vulnerabilities in Three Modules

Related Reading: Drupal Security Updates Patch Two Vulnerabilities

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Expert Insights

Related Content

Mobile & Wireless

Technical details published for an Arm Mali GPU flaw leading to arbitrary kernel code execution and root on Pixel 6.

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

Mobile & Wireless

Apple’s iOS 12.5.7 update patches CVE-2022-42856, an actively exploited vulnerability, in old iPhones and iPads.


Security researchers have observed an uptick in attacks targeting CVE-2021-35394, an RCE vulnerability in Realtek Jungle SDK.

Mobile & Wireless

Two vulnerabilities in Samsung’s Galaxy Store that could be exploited to install applications or execute JavaScript code by launching a web page.


Several vulnerabilities have been patched in OpenText’s enterprise content management (ECM) product.


Google has awarded more than $25,000 to the researchers who reported the vulnerabilities patched with the release of the latest Chrome update.