Arbitrary Code Execution Affecting drupal/core package, versions <9.3.19>=9.4.0, <9.4.3


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.28% (69th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Arbitrary Code Execution vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PHP-DRUPALCORE-2960164
  • published26 Jul 2022
  • disclosed26 Jul 2022
  • creditElar Lang

Introduced: 26 Jul 2022

CVE-2022-25277  (opens in a new tab)
CWE-94  (opens in a new tab)

How to fix?

Upgrade drupal/core to version 9.3.19, 9.4.3 or higher.

Overview

drupal/core is an an open source content management platform powering millions of websites and applications.

Affected versions of this package are vulnerable to Arbitrary Code Execution if the site is configured to allow the upload of files with an htaccess extension that will not be properly sanitized. This allows a bypass of the default protections.

CVSS Scores

version 3.1