Improperly Controlled Modification of Dynamically-Determined Object Attributes Affecting drupal/core package, versions >=8.8.0, <10.2.11>=10.3.0, <10.3.9


Severity

Recommended
0.0
critical
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Improperly Controlled Modification of Dynamically-Determined Object Attributes vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PHP-DRUPALCORE-8492741
  • published10 Dec 2024
  • disclosed9 Dec 2024
  • creditDrew Webber

Introduced: 9 Dec 2024

NewCVE-2024-55638  (opens in a new tab)
CWE-915  (opens in a new tab)

How to fix?

Upgrade drupal/core to version 10.2.11, 10.3.9 or higher.

Overview

drupal/core is an an open source content management platform powering millions of websites and applications.

Affected versions of this package are vulnerable to Improperly Controlled Modification of Dynamically-Determined Object Attributes through the deserialization process. An attacker can execute arbitrary code or manipulate the application state by injecting crafted data that leads to object injection.

Notes:

  1. All versions of Drupal 10 prior to 10.2 are end-of-life and do not receive security coverage. Drupal 8 and Drupal 9 have both reached end-of-life.

  2. For it to be exploitable, a separate vulnerability must be present to allow an attacker to pass unsafe input to unserialize().

CVSS Scores

version 4.0
version 3.1