logo

CVE-2020-13674 drupal/core

Package

Manager: composer
Name: drupal/core
Vulnerable Version: >=8.0.0 <8.9.19 || >=9.1.0 <9.1.13 || >=9.2.0 <9.2.6

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00131 pctl0.33368

Details

Cross-Site Request Forgery in Drupal core The QuickEdit module does not properly validate access to routes, which could allow cross-site request forgery under some circumstances and lead to possible data integrity issues. Sites are only affected if the QuickEdit module (which comes with the Standard profile) is installed. Removing the "access in-place editing" permission from untrusted users will not fully mitigate the vulnerability.

Metadata

Created: 2022-02-12T00:00:47Z
Modified: 2022-02-23T19:23:39Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/02/GHSA-j586-cj67-vg4p/GHSA-j586-cj67-vg4p.json
CWE IDs: ["CWE-352"]
Alternative ID: GHSA-j586-cj67-vg4p
Finding: F007
Auto approve: 1