CVE-2024-55636 – drupal/core-recommended
Package
Manager: composer
Name: drupal/core-recommended
Vulnerable Version: >=8.8.0 <10.2.11 || >=10.3.0 <10.3.9 || >=11.0.0 <11.0.8
Severity
Level: Low
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
EPSS: 0.04912 pctl0.89192
Details
Drupal core contains a potential PHP Object Injection vulnerability Drupal core contains a potential PHP Object Injection vulnerability that (if combined with another exploit) could lead to Artbitrary File Deletion. It is not directly exploitable. This issue is mitigated by the fact that in order to be exploitable, a separate vulnerability must be present that allows an attacker to pass unsafe input to `unserialize()`. There are no such known exploits in Drupal core. To help protect against this vulnerability, types have been added to properties in some of Drupal core's classes. If an application extends those classes, the same types may need to be specified on the subclass to avoid a `TypeError`. This issue affects Drupal Core: from 8.0.0 before 10.2.11, from 10.3.0 before 10.3.9, from 11.0.0 before 11.0.8.
Metadata
Created: 2024-12-10T00:31:27Z
Modified: 2025-06-04T00:50:14Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/12/GHSA-938f-5r4f-h65v/GHSA-938f-5r4f-h65v.json
CWE IDs: ["CWE-502", "CWE-915"]
Alternative ID: GHSA-938f-5r4f-h65v
Finding: F006
Auto approve: 1